Today we will perform manual SQL injection with integer based method for the MySQL database. I hope the last article …
Fancy Bear hackers’ UK link revealed
As dangerous as they may be, a Russian cyberespionage group allied with the Kremlin known as APT28, Fancy Bear, Sofacy, …
Top Secret Data that Belongs to US Army and NSA leaked online
Critical data that belongs to United States Army Intelligence Security Command (INSCOM) and (National Security Agency) NSA data leaked online …
Ursnif Malware Variant Performs Malicious Process Injection in Memory using TLS Anti-Analysis Evasion Trick
A Sophisticated Ursnif Malware variant using manipulated TLS call back Anti-Analysis Technique while injecting the Child Process for changing the …
Google Discovered New Tizi Android Spyware that can Spying WhatsApp, Viber, Skype, LinkedIn
A highly critical Tizi Android Spyware discovered from Google Play store that have rooting capabilities to spying the sensitive information …
Mr.SIP – SIP Attack And Audit Tool
Mr.SIP was developed in Python as a SIP Attack and audit tool which can emulate SIP-based attacks. Originally it was …
The Cyber Risk of Online Gambling websites – Are Casinos Safe?
For online Gambling house, data protection is not only an obligation but also a necessary measure to retain customers and earn more …
Facebook Image Removal Vulnerability allows Users to Delete any Photos
Facebook recently introduced a poll feature which allows users to make votable questions as the status on both Android and …
Bitcoin Gold wallet compromised, users may have downloaded malware
It seems that Bitcoin Gold has been dealt more than their share of bad luck recently. The company is still …
Linux Distributions Suffering with Denial of Service by systemd Vulnerability
A Linux Suffering from systemd(System and Service Manager) vulnerability that leads to performing a Denial of Service in many Linux …