New bug discovered in macOS High Sierra allows unlocking the App Store System Preferences by any password. App Store System …
Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 …
New Programming Language “Kotlin” used for Developing an Android Malware
An Open-source Programming language “kotlin” has bee used to develop malicious Android apps that are capable of hijacking an Android …
Ransomware Attack Response and Mitigation Checklist
Ransomware is one of the fast Growing threat in the worldwide and its considered as a leader of Global cyber …
Using Breach & Attack Simulation Technologies to test Organizations Security Posture on-demand
The best way for an organization to protect itself against cybercrooks is to think and act like one. There is …
New Malware Campaign Trick Victims as an Adobe Flash Player Installers
Security researchers from ESET identified the sophisticated hacker group Turla added new malware to its arsenal. It attempts victims to …
WPA3 Announced After KRACK Attack to Improve Security for Personal and Enterprise Wi-Fi Networks
Wi-Fi alliance introduced WPA3 security standard with new enhancements to reduce the potential attacks against network misconfiguration and centralized authentication …
SIEM Better Visibility for Analyst to Handle an Incident with Event ID
We are in the complex world where attacks are increasing day by day, so today the cyber intelligence depends in siem …
Advantages of Bug Bounty Program Over Traditional Penetration Testing
Web Applications Security becomes essential as more and more data gets stored in web applications. As such, testing of web …
Cracking WPA/WPA2 Passwords in Minutes with Fluxion
Fluxion repack of LINSET with minor bugs and with added features. It’s compatible with latest Kali Linux, Rolling Edition. What is WPA/WPA2? …