Verizon owned as many as 14 Millions of customer’s data exposed online by telephonic software and data firm NICE Systems, …
WebDAV to Run a Secret Communication Channel between Victim and Control Server
WebDAV(Web Distributed Authoring and Versioning) is the extended framework of HTTP protocol which includes more features such as clients can …
Global Law Enforcement Agencies shutdown the Largest and Dangerous Andromeda Botnet
Andromeda Botnet dismantled after the joint investigation with law enforcement agencies around the Globe.The takedown took place on 29 November …
Nadine Dorries faces backlash over lax attitude to cybersecurity
According to an MP, it’s common to share one’s login passwords with their colleagues in the House of Commons. Defending …
Cr3dOv3r – Credential Reuse Attack Tool
Cr3dOv3r is a fairly simple Python-based set of functions that carry out the prelimary work as a credential reuse attack …
Hacked Passwords Reselling Website Leakbase Goes Offline
Leakbase a website that resells the hacked passwords exfiltrated from most significant data breach went offline.It contains more than two …
Xerosploit – Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks
In this Kali Linux Tutorial, we are to work with Xerosploit. Xerosploit is a penetration testing toolbox whose objective is …
Paypal Acquired Company TIO Networks Suffered a Data Breach that Impacts 1.6 Million Customers
PayPal confirmed the suspension of operation with TIO Networks, as they identified unauthorized access to the servers that store customers …
Wall Street embraces bitcoin to trade futures on exchanges
Bitcoin’s stratospheric rise this week follows the digital currency’s embrace by mainstream trading platforms and is seen by some in …
Beware!! PayPal Phishing Attack cleverly Tricks you and Asks to Verify Transactions
Newly spreading PayPal Phishing Attack Tricking the user into verifying the Transactions details via Email medium and it looks like a completely …