Self-XSS attack using bit.ly to grab cookies tricking users into running malicious code How it works?Self-XSS is a social engineering …
NXNSAttack technique can be abused for large-scale DDoS attacks
A team of academics from Israel has disclosed today details about NXNSAttack, a vulnerability in DNS servers that can be …
How SaaS Management Vigilance Protects Your Company From Cyberattacks?
Software as a Service (SaaS) applications are known for their high potential for cybersecurity vulnerabilities — that is, if you …
FBI warns about attacks on Magento online stores via old plugin vulnerability
The FBI says hackers are exploiting a three-year-old vulnerability in a Magento plugin to take over online stores and plant …
BlackDir-Framework – Web Application Vulnerability Scanner
Web Application Vulnerability Scanner. Spider Directories Find Sub Domain Advanced Dorks Search Scan list of Dorks Scan WebSites [Xss,Sql] Reverse …
5 Ways Cyber Security Is Changing In 2020
Introduction Security whilst online has been paramount for many years and with the ever-advancing technology available to us, cybersecurity is …
BADlnk – Reverse Shell In Shortcut File (.lnk)
Reverse Shell in Shortcut File (.lnk) How it works?Shortcut file (Microsoft Windows 9.x) LNK is a file extension for a …
Hackers preparing to launch ransomware attacks against hospitals arrested in Romania
Romanian law enforcement has cracked down today on a hacker group that was preparing to launch ransomware attacks on Romanian …
Hidden-Cry – Windows Crypter/Decrypter Generator With AES 256 Bits Key
Windows Crypter/Decrypter Generator with AES 256 bits key Features: Works on WAN: Port Forwarding by Serveo.net Fully Undetectable (FUD) -> …
Supercomputers hacked across Europe to mine cryptocurrency
Multiple supercomputers across Europe have been infected this week with cryptocurrency mining malware and have shut down to investigate the …