Security researchers from TrendMicro observed a crypto mining attack by exploiting the vulnerabilities in the popular database system to deliver …
Ransomware-as-a-Service – New Saturn Ransomware Available to Anyone For Free
Now any anyone can become a distributor of newly identified Saturn ransomware through the Ransomware as a Service affiliate program. …
Top 10 Penetration Testing & Ethical Hacking Linux Distributions – 2018
Penetration Testing with Linux is the best option for every Security Researcher or Ethical Hacker. Here is the list of Top …
Android Application Penetration Testing – Part 12
Mobile platforms provide many different services, from authentication, to secure data storage, to secure network communications. Failing to use some …
Coinhoarder Hackers Abused Google AdWords & Earned More than $50 Million via Bitcoin Phishing Campaign
Ukraine Cyberpolice and Researchers from Cisco Talos uncovered a Bitcoin Phishing campaign that uses Google AdWords to find their victim. …
Biggest Crypto-Mining Campaign Ever – Hackers Mine $3 Million Worth of Monero Crypto-currency
Security researchers from Checkpoint discovered a largest Monero mining activity that uses XMRig miner on various versions of Windows machines. …
Ethereum vs Bitcoin: Can the Ethereum Take the Throne?
Bitcoin has always been the leading cryptocurrency running the show for quite some time now until in the year 2014 …
Serious iOS Bug – A Single Text Character Can Crash any Apple iPhone, Mac or iPad
A single character can crash iPhone if it simply pasted in the text field, received as a message via apps …
DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits
IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete …
Hackers Using Macro-Less Approach to Steal Victims Password Through Office Documents
Hackers use macros in Microsoft Office documents to distribute malicious scripts and it will be executed once the user opens …