A known browser vulnerability exploits the default browser Password manager that abused by third-party scripts and exfiltrate the hidden user …
Three more Malicious Backdoored plugins with More than 89,000 Active Installs found in WordPress Repository
WordPress has such a massive ecosystem consist of a number of plugins and themes, threat actors involved in various malicious …
What Is A Bug Bounty Program And Why Every Organization Needs One?
What Is A Bug Bounty Program? A Bug bounty program is also known as vulnerability rewards program (VRP) is the …
Acoustic Attack Against HDDs Can Cause Permanent Damage CCTV DVR, PCs, ATMs
Hard disks play a vital role in numerous computing systems including, personal computers, closed-circuit television (CCTV) systems, medical bedside monitors, …
Load Balancer-Reverse Proxy Reconnaissance On Target Domain
Reconnaissance work on target domain to find out target domain has load balancer so that penetration testing does not misdirect …
Top hoax stories of 2017
As we prepare to bid our adieu to 2017, let’s have a look back at the year’s trending news points …
USB Forensics – Reconstruction of Digital Evidence from USB Drive
Digitial Forensics analysis of USB forensics include preservation, collection, Validation,Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from …
Russian Bank ATM Vulnerability Allows to Hack the ATM by Pressing Shift Key Five Times
A Russian user discovered a major ATM vulnerability in Windows XP running ATM machine that could be compromised by pressing …
KickThemOut -Tools to Kick Devices out of Your Network and Enjoy all the Bandwidth
KickThemOut -Tools to kick devices out of your network and enjoy all the bandwidth for yourself.It permits you to choose …
Facebook messenger falls victim to an anonymous crypto cousin of Bitcoin
With the booming value of digital currency, numerous hackers are rolling out schemes to unwittingly trap or trick more likely, …