A new Pwned Passwords Tool has been released with tons of already compromising password database to helps the user to check …
Hackers Abused Oracle WebLogic Server for Mining Cryptocurrencies
There is a rapid growth in cryptocurrency attacks from the mid of 2017, mining cryptocurrency requires more computing power, which …
Android P Limits the Use of Background Apps Accessing the Camera when the Device is Idle
Nowadays trojanized Android apps evolving rapidly every day, cyber criminals use numbers of methods to upload malicious apps in play …
Adobe Acrobat Reader DC Affected with Critical Remote Code Execution Vulnerability – Its Time to Update
A Critical Remote Code Execution vulnerability discovered in Adobe Acrobat Reader DC that will perform a stack-based buffer overflow and …
Hackers Illegally Purchasing Abused Code-signing & SSL Certificates From Underground Market
Threat actors using Abused Code-signing certificate from reputable companies as a layer of obfuscation in distributing malicious payloads. Abused Codesigning …
Attackers profited more than $300,000 with new SamSam Ransomware Campaign
SamSam Ransomware campaign evolution continues and this time a new variant but there is no difference in the encryption mechanism …
Complete Ethical Hacking and Penetration Testing Course Bundle – Become a Professional Ethical Hacker
Today we want to introduce you to the “Complete Ethical Hacking and Penetration Testing Course A to Z Bundle with …
Linux Backdoor that Creates Fully Encrypted Reverse Shell and Attack Unsecured Linux Systems
A dangerous Linux backdoor Chaos that targeting improperly Secured Linux systems by using fully encrypted and integrity checked reverse shell. Hackers performing …
JP Morgan Chase Affected with Internal “glitch” and Customers Bank Account shows others Account Information
JPMorgan Chase Multiple customers of JP Morgan Chase reported unusual activities in bank account login due to internal glitch and …
Zero Day Attack Prevention: A Fundamental Pillar of Security
Preventing zero day attack, one of a developer’s worst nightmares. In this guide, we’ll tackle the A to Zs of …