Attackers abused vulnerable Memcached Servers to launch high-bandwidth DDoS attacks and there is a huge increase observed in this attack …
Bitdefender Releases FREE GandCrab Ransomware Decryption Tool
The latest ransomware kicking everyone’s ass is Gandcrab which has infected an estimated 50,000 computers, fortunately for the victims, Bitdefender …
A Facebook Vulnerability that Allows to Reveals the Facebook Page Admin Identity
A new facebook vulnerability discovered by the Security researcher that allows revealing the Facebook page admin identity in plain text. …
Several Gas Station Design Flaws Allows Attackers to Change the Price and Take Full Control on the Gas Station Remotely
The Executive Committee of the Mediterranean Association of ICT Experts (ASPERTIC), meeting at its winter assembly in Barcelona on 16 …
Now Law Enforcement Agencies Can Possibly Breakthrough into any iPhone Model up to iOS 11
It appears that law enforcement agencies can breakthrough into any iPhone Model up to iOS 11 as the Israel firm …
Insider Threat Detection Software: Protecting Against the Insider Threat – What You Should Know
Insider Threat is one of the dangerous threat actors for many organization and keeping your business protected from outside threats …
Quickjack – Advanced Clickjacking & Frame Slicing Attack Tool
Quickjack is an intuitive, point-and-click tool for performing advanced and covert clickjacking and frame slicing attacks. It also allows you …
Pwned Passwords Tool – Check Your Password that Ever Compromised in any of Major Data Breaches
A new Pwned Passwords Tool has been released with tons of already compromising password database to helps the user to check …
Hackers Abused Oracle WebLogic Server for Mining Cryptocurrencies
There is a rapid growth in cryptocurrency attacks from the mid of 2017, mining cryptocurrency requires more computing power, which …
Android P Limits the Use of Background Apps Accessing the Camera when the Device is Idle
Nowadays trojanized Android apps evolving rapidly every day, cyber criminals use numbers of methods to upload malicious apps in play …