snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are …
Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques …
Hackers Distributing Dangerous Malware via YouTube to Steal Passwords
Cybercriminal’s pushing a dangerous malware via YouTube videos comments section that designed to steal files and sensitive data from the …
UHBVN Billing Data Hacked and Hackers Demanding one Crore in Bitcoins
UHBVN was hacked, hackers stole the billing data and demands for one crore ransom in Bitcoins. The cyber attack happened …
Live Forensics Analysis with Computer Volatile Memory
Forensics Analysis The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted …
Hiddenminer – Android Monero Mining Malware Can Overheat and Cause Device Failure
A new Monero Mining Android malware dubbed ANDROIDOS_HIDDENMINER that uses the device CPU power to mine Monero malware and could …
Aggressive Scans by Hajime Botnet Targeting Port 8291 With a new Exploit
Hajime Botnet variant made a massive come back with new features and this time it targets port 8291 to check …
Simple & Important Ways to Protect your Business from Cyber Attacks
A vital role of the internet in completing various tasks, such as selling online goods, transferring funds is worth considering. …
Firefox Launches Facebook Container Add-On that Makes Facebook Tracking Harder
Mozilla launched a new Firefox add-on Facebook container that makes tracking harder by isolating your Facebook identity from the rest …
TOR and VPN Anonymous Enough for Dark Web
Dark web is the World Wide Web content that exists on darknets, overlay systems which use public Internet yet we …