The phishing attack hugely attacking organizations financial departments by tricking victims into downloading trojans and malicious code meant for stealing …
Organization Cyber Disaster Recovery Plan Checklist
Calamity occurrence in any area, arising from natural or man made causes, or by accident or negligence which results in …
Muslim Hacktivist Hacked into Isis Website that Claimed to be Unhackable
After a number of cyber attacks and official takedowns over Isis news agency Amaq, they have issued a statement on …
Bypass an Anti Virus Detection with Encrypted Payloads using VENOM Tool
Nowadays many Malware and Payloads are using Encryption techniques and packing techniques using Packers to Evade the Anti Virus Software …
Intel Skylake processors can be hacked via USB ports
Back in September 2017, Positive Technologies’ experts had expressed interest in the development of a technique that can attack the …
Anti Virus Software’s Design Flaw Leads to Bypass Windows Local Privilege
A new Antivirus design flow has discovered and named as AVGater for the Windows Local Privilege Escalation Vulnerability which is …
Boeing 757 Airplanes are Vulnerable to Remote Hacking
U.S. Department of Homeland Security (DHS) conducted a test on Boeing 757 jets.The test was successful and Remote Hacking was tested …
Important Security practices for users to Open Microsoft Office Documents Securely
Microsoft office documents utilized in wide by attackers to send the malicious file and then convincing the user to open …
Ordinypt ransomware disguises itself as an e-mail application
A new ransomware strain called Ordinypt (also known under the cryptic name “HSDFSDCrypt” or completely Win32.Trojan-Ransom.HSDFSDCrypt.A) is currently targeting victims …
All Android Version Except 8.0/Oreo are Vulnerable to Toast Overlay Malware Attack
A First Android malware called TOASTAMIGO has been discovered that capable of install other malware into infected devices using Toast Overlay attack. …