Fake apps under the name JioCoin are continuously uploading into Google play store that claims to help users to invest …
New Variant of Scarab Ransomware Distributed via RDP on Systems and Servers
Security researchers from Malwarebytes detected Scarab ransomware variant distributed through RDP and used AES algorithm for encryption. The Scarabey variant …
0-Day Flash Vulnerability Exploited In The Wild
So another 0-Day Flash Vulnerability is being exploited in the Wild, a previously unknown flaw which has been labelled CVE-2018-4878 …
Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack
Disabling and bypass SSL pinning Certificate Pinning is an extra layer of security to achieve protection against man-in-the-middle. It ensures …
Latest Google Dorks List 2018 For Ethical Hacking and Penetration Testing
Google Dorks List “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that …
17 year old school boy arrested for Creating Malware that steals Cryptocurrency Wallet Private key passwords
A 17-year-old schoolboy arrested by Japanese police expecting to be the author of a Malware that steals Cryptocurrency Monacoin wallet …
Droidclub Botnet via Malicious Chrome Extensions That Affect More Than Half a Million Users
Security researchers from Trend Micro detected a new botnet dubbed Droidclub distributed through malicious chrome extensions. Attackers used malvertising and …
Beware!! New Zero-day Vulnerability Found in Adobe Flash Player – Still No Patches Available
Adobe Flash Player now suffering from brand New Zero-day vulnerability with high severity rate and researchers believes that it cause …
Cryptocurrency Mining Smominru Botnet Infected more than 500,000 Windows Machines
Security researchers from Proofpoint detected Monero miners that spread using the infamous EternalBlue Exploit. Attackers using persistent Botnet dubbed Smominru …
dorkbot – Command-Line Tool For Google Dorking
usage: dorkbot.py [–h] [–c CONFIG] [–b BLACKLIST] [–d DATABASE] [–i INDEXER] [–l] [–o INDEXER_OPTIONS] [–p SCANNER_OPTIONS] [–s SCANNER] [–v VULNDIR] …