In this Kali Linux Tutorial, we show you how to use xerxes in launching a DOS attack.DDOS tools are capable …
Facebook Will Alert You if Someone Upload Your Photo Using New Facial Recognition Technology
Facebook announced new optional tools with new face recognition technology which are now rolling out to alert you when someone uploaded …
InSpy – Linkedin Information Gathering tool for Pentesters
The objective of this Information Gathering tool is to extract Linkedin users based on the organization, job description or email …
Mobile Security Testing to Protect Your Applications From Cyber Threats
Owing to the sudden increase in the use of smartphones, tablets and other mobile devices, mobile application these days are …
Digmine – Cryptocurrency Mining Malware Spreading via Facebook Messenger
Malware miners are in the raise starting from this year, attackers using various social engineering and more sophisticated attacks for …
Nissan Canada Data Breach May have Exposed more than 1 Million Customers Data
Nissan Canada suffers a data breach that may have exposed around 1.3 Million of sensitive customers records of Nissan Canada …
Microsoft Windows Face Authentication Bypassed with a Spoofed Photo
Windows 10 provides Face Authentication technology with specific Windows “Hello compatible cameras,” it uses a camera exceptionally designed for close …
Scanning for OWASP Top 10 Vulnerabilities with Metasploit for the Web(w3af)
w3af is an open source web application security scanner (OWASP Top 10) which enables developers and penetration testers to distinguish …
A Group Behind the VenusLocker Ransomware Switch into Secretly Mining Monero Cryptocurrency
A new malware attack distributing to mine Monero cryptocurrency by the group Behind the VenusLocker Ransomware. VenusLocker Ransomware discovered in …
Email Spoofing – Exploiting Open Relay configured Public Mailservers
Email spoofing is the way of delivering forged emails to recipients.These methods are used by criminals to launch attacks like phishing or …