A new facebook vulnerability discovered by the Security researcher that allows revealing the Facebook page admin identity in plain text. …
Several Gas Station Design Flaws Allows Attackers to Change the Price and Take Full Control on the Gas Station Remotely
The Executive Committee of the Mediterranean Association of ICT Experts (ASPERTIC), meeting at its winter assembly in Barcelona on 16 …
Now Law Enforcement Agencies Can Possibly Breakthrough into any iPhone Model up to iOS 11
It appears that law enforcement agencies can breakthrough into any iPhone Model up to iOS 11 as the Israel firm …
Insider Threat Detection Software: Protecting Against the Insider Threat – What You Should Know
Insider Threat is one of the dangerous threat actors for many organization and keeping your business protected from outside threats …
Quickjack – Advanced Clickjacking & Frame Slicing Attack Tool
Quickjack is an intuitive, point-and-click tool for performing advanced and covert clickjacking and frame slicing attacks. It also allows you …
Pwned Passwords Tool – Check Your Password that Ever Compromised in any of Major Data Breaches
A new Pwned Passwords Tool has been released with tons of already compromising password database to helps the user to check …
Hackers Abused Oracle WebLogic Server for Mining Cryptocurrencies
There is a rapid growth in cryptocurrency attacks from the mid of 2017, mining cryptocurrency requires more computing power, which …
Android P Limits the Use of Background Apps Accessing the Camera when the Device is Idle
Nowadays trojanized Android apps evolving rapidly every day, cyber criminals use numbers of methods to upload malicious apps in play …
Adobe Acrobat Reader DC Affected with Critical Remote Code Execution Vulnerability – Its Time to Update
A Critical Remote Code Execution vulnerability discovered in Adobe Acrobat Reader DC that will perform a stack-based buffer overflow and …
Hackers Illegally Purchasing Abused Code-signing & SSL Certificates From Underground Market
Threat actors using Abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads. Abused Codesigning …