A new Variant called “OMG” currently evolving to abuse the IoT Devices and turns it into a Proxy server by …
Wikipedia Page Linked with “Minr” Cryptojacking Malware Infected 3rd Party Website
Cryptojacking Malware called “Minr“ infected website has been linked with Wikipedia Page that leads to mine the cryptocurrency Monero (XMR). Wikipedia …
Security Update – Intel released Spectre patches for Kaby Lake, Coffee Lake, Skylake Platforms
Intel released microcode updates to address Spectre vulnerability(CVE-2017-5715) for many of its chipsets including the recently announced Intel® Xeon® Scalable …
Hackers Spreading Cryptocurrency Mining scripts via videos that Embedded in MS Office Word Documents
Microsoft word documents abused by Cryptocurrency Mining script embedded phishing Videos and victims tricked into watching an “innocent” video that leads …
Masscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 Minutes
Masscan – Worlds fastest scanner can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second. …
Now Fix Available for Indian Telugu Character that Crashes Apple Devices
Last week the text bomb bug came to light, that a single Indian Telugu Character that can crash applications on Apple …
Cryptojacking Attack – Tesla Internal Servers Hacked to Mine Cryptocurrency
Tesla internal servers compromised by hackers and exposed the sensitive data from Tesla’s Kubernetes console that has been used for …
Hackers Abusing Apache CouchDB Vulnerabilities to Deploy Malware & Mining Monero Cryptocurrency
Security researchers from TrendMicro observed a crypto mining attack by exploiting the vulnerabilities in the popular database system to deliver …
Ransomware-as-a-Service – New Saturn Ransomware Available to Anyone For Free
Now any anyone can become a distributor of newly identified Saturn ransomware through the Ransomware as a Service affiliate program. …
Top 10 Penetration Testing & Ethical Hacking Linux Distributions – 2018
Penetration Testing with Linux is the best option for every Security Researcher or Ethical Hacker. Here is the list of Top …