The ‘Quarterly Threat Report’ from IT security solutions provider Quick Heal Security Labs states that during Q3 2017, Microsoft Windows …
testssl.sh – Tool to check cryptographic flaws and TLS/SSL Ciphers on any Ports
testssl.sh is a free command line tool which checks a server’s administration on any port for the help of TLS/SSL …
Surprising Differences between TLS and SSL Protocol
TLS is simply a successor of SSL 3.0, TLS is a protocol which provides Data encryption and Integrity between communication …
Janus Vulnerability – Hackers to Modify Android Apps Code Without Affecting Their Signatures
Janus Vulnerability, a new flaw discovered in Android apps that is capable of modifying the Android app’s code without making …
Hacker from Samara city sentenced for Creating and Selling Malware
Sergei Materov, a 42-year old hacker from Samara, the sixth largest city in Russia, has been sentenced at the Prikubansky …
Exploitation Framework for Embedded devices – RouterSploit
The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing …
Keylogger Discovered in HP Notebook Keyboard Drivers
HP Notebook Drivers contains Keylogger vulnerability that can be abused by hackers and steal the user’s information which could be …
Russian Central Bank warned of possible Cyber Attack before New Year
The Central Bank of Russia warns of new hacker attacks on financial institutions in the eve of New Year holidays. …
Process Doppelgänging Attack Works on all version of Windows Evade AV products and Forensics tools
Security researchers from Endpoint Security firm Ensilo discovered a new Evasion technique dubbed Process Doppelgänging which works with all the …
DOWNAD Malware using Dictionary Attack to Control the Servers & Remotely Execute Code
A Banking Trojan called DOWNAD has been discovered after 9 years that is capable of remotely inject malicious code into …