As technology evolves, fraudsters and hackers adapt their techniques. They get smarter and find new ways to beat the tech. …
What is Cloud Networking?
When you have many computers in a corporation with sensitive data or captured work that needs to be viewed regularly, …
Hackers check Citrix servers for weakness in remote code execution
At least eighty thousand organisations could be at risk. Cyber attackers scan Citrix servers, which are vulnerable to a critical …
Hackers Steal $49 million in Cryptocurrency Exchange Upbit Ethereum
South Korean cryptocurrency exchange Upbit today said hackers could steal $49 million in Ethereum. On 27 November, the crypto-coins were …
Special Olympics New York Hacked to Send Phishing Emails
New York Special Olympics has been compromised, a non-profit organization focusing on competitive athletes with mental handicaps. New York Special …
Current SectopRAT trojan generates the second secret desktop for browser control sessions
In the wild has emerged a new Trojan, SectopRAT, which has been able to start a secret secondary desktop for …
Aventura Pays No Security Vulnerabilities for Flogging Chinese Intelligence Devices on the US government 100%
Accusations of fraud were brought against Aventura Technologies and its owner following the suspected selling of monitoring equipment to the …
Salesforce Health Cloud Provides Support for Medical Device Companies
The new pharmaceutical features will help companies to develop more direct relations with patients. On Tuesday, Salesforce launched new capabilities …
HomePwn – Swiss Army Knife for Pentesting of IoT Devices
HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day …
JSONBee – A Ready To Use JSONP Endpoints/Payloads To Help Bypass Content Security Policy Of Different Websites
A ready to use JSONP endpoints to help bypass content security policy of different websites.The tool was presented during HackIT …