w3af is an open source web application security scanner (OWASP Top 10) which enables developers and penetration testers to distinguish …
A Group Behind the VenusLocker Ransomware Switch into Secretly Mining Monero Cryptocurrency
A new malware attack distributing to mine Monero cryptocurrency by the group Behind the VenusLocker Ransomware. VenusLocker Ransomware discovered in …
Email Spoofing – Exploiting Open Relay configured Public Mailservers
Email spoofing is the way of delivering forged emails to recipients.These methods are used by criminals to launch attacks like phishing or …
Tracking Photo’s Geo-location with GPS EXIF DATA – Forensic Analysis
This article is about collecting metadata from photographs. Metadata is an information which is created for every file’s format. Examples for …
Bitcoin Exchange YouBit Shutdowns after being Hacked Second Time this Year
Bitcoin exchange Youbit shutdowns services after it was hacked second time in the same year within eight months. The first …
123 Million American Households Sensitive Data Leaked Online – A Massive Data Leak
A massive database that contains 123 Million American households sensitive personal information leaked online by California-based data analytics firm. An …
New “GnatSpy” Mobile Malware Stealing data Such as Images, Text messages, Contacts, and Call History
A newly emerging mobile malware GnatSpy capable of abusing infected mobile and stealing various type of data such Images, Text …
Google to take action against misleading news sites
Amid a growing clamour against fake content online, Google has announced it may take off from its news index the …
Safehats – The Best Alternative Bug Bounty Program for HackerOne and Bugcrowd
A Bug bounty program also known as vulnerability rewards program (VRP) is the one where security researchers can disclose vulnerabilities …
DDOS a Website Anonymously by Using Kali Linux Tools
DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting its …