Security researchers from Checkpoint discovered a largest Monero mining activity that uses XMRig miner on various versions of Windows machines. …
Ethereum vs Bitcoin: Can the Ethereum Take the Throne?
Bitcoin has always been the leading cryptocurrency running the show for quite some time now until in the year 2014 …
Serious iOS Bug – A Single Text Character Can Crash any Apple iPhone, Mac or iPad
A single character can crash iPhone if it simply pasted in the text field, received as a message via apps …
DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits
IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete …
Hackers Using Macro-Less Approach to Steal Victims Password Through Office Documents
Hackers use macros in Microsoft Office documents to distribute malicious scripts and it will be executed once the user opens …
North Korean Hacking Group “Lazarus” Targeting Banks & Bitcoin Users Via Sophisticated Malware
A New Malware campaign dubbed HaoBao distributing by North Korean Hacking Group “Lazarus” that specifically targets cryptocurrency and financial organizations via …
Most Important Endpoint Security & Threat Intelligence Tools List for Hackers and Security Professionals
Endpoint Security & Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and …
AndroRAT – A Remote Access Trojan Compromise Android Devices and Inject Root Exploits
A Newly discovered Android Remote Access Trojan called AndroRAT targeting unpatched Android Devices that exploit the publicly disclosed critical privilege escalation …
Is it possible to Read Someone Facebook Messages Without Them Knowing?
Facebook plays a vital role in our day to day life, it redefines the way of communication across the globe. …
Intel Expands Bug Bounty Program Rewards To $250,000 for Meltdown and Spectre Like Vulnerabilities
Intel Bug Bounty Program launched starting from March 2017 to collaborate with researchers and to mitigate the risk of exploitation. …