After a number of cyber attacks and official takedowns over Isis news agency Amaq, they have issued a statement on …
Bypass an Anti Virus Detection with Encrypted Payloads using VENOM Tool
Nowadays many Malware and Payloads are using Encryption techniques and packing techniques using Packers to Evade the Anti Virus Software …
Intel Skylake processors can be hacked via USB ports
Back in September 2017, Positive Technologies’ experts had expressed interest in the development of a technique that can attack the …
Anti Virus Software’s Design Flaw Leads to Bypass Windows Local Privilege
A new Antivirus design flow has discovered and named as AVGater for the Windows Local Privilege Escalation Vulnerability which is …
Boeing 757 Airplanes are Vulnerable to Remote Hacking
U.S. Department of Homeland Security (DHS) conducted a test on Boeing 757 jets.The test was successful and Remote Hacking was tested …
Important Security practices for users to Open Microsoft Office Documents Securely
Microsoft office documents utilized in wide by attackers to send the malicious file and then convincing the user to open …
Ordinypt ransomware disguises itself as an e-mail application
A new ransomware strain called Ordinypt (also known under the cryptic name “HSDFSDCrypt” or completely Win32.Trojan-Ransom.HSDFSDCrypt.A) is currently targeting victims …
All Android Version Except 8.0/Oreo are Vulnerable to Toast Overlay Malware Attack
A First Android malware called TOASTAMIGO has been discovered that capable of install other malware into infected devices using Toast Overlay attack. …
Skype Log Viewer Download – View Logs on Windows
Skype Log Viewer allows you to download and view the Skype history and log files, on Windows, without actually downloading …
Diving Deeper to Understand the Windows Event logs for Cyber Security Operation Center
Cyber Security operations center is protecting organizations and sensitive business data of customers. It ensures active monitoring of valuable assets …