A Critical Remote Code Execution vulnerability discovered in Adobe Acrobat Reader DC that will perform a stack-based buffer overflow and …
Hackers Illegally Purchasing Abused Code-signing & SSL Certificates From Underground Market
Threat actors using Abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads. Abused Codesigning …
Attackers profited more than $300,000 with new SamSam Ransomware Campaign
SamSam Ransomware campaign evolution continues and this time a new variant but there is no difference in the encryption mechanism …
Complete Ethical Hacking and Penetration Testing Course Bundle – Become a Professional Ethical Hacker
Today we want to introduce you to the “Complete Ethical Hacking and Penetration Testing Course A to Z Bundle with …
Linux Backdoor that Creates Fully Encrypted Reverse Shell and Attack Unsecured Linux Systems
A dangerous Linux backdoor Chaos that targeting improperly Secured Linux systems by using fully encrypted and integrity checked reverse shell. Hackers performing …
JP Morgan Chase Affected with Internal “glitch” and Customers Bank Account shows others Account Information
JPMorgan Chase Multiple customers of JP Morgan Chase reported unusual activities in bank account login due to internal glitch and …
Zero Day Attack Prevention: A Fundamental Pillar of Security
Preventing zero day attack, one of a developer’s worst nightmares. In this guide, we’ll tackle the A to Zs of …
Active Business Phishing Campaign Targeting Fortune 500 Companies to Steal Financial Assets
Hackers involved in Business Phishing Campaign using well crafted social engineering methods to harvest login credentials and to steal money. …
Hackers Distributing Malicious RTF Excel Sheets Document and Installing RAT using VBA Macro code
A recently discovered RTF documents that contain malicious VBA Macro code distributing to infect the windows users with dangerous Remote …
Beware!! Hackers Using Facebook Profiles to Trick the User’s in Downloading Android Spyware
Hackers using attractive fake Facebook profiles to trick the users into downloading Android Tempting Cedar Spyware that can steal pieces …