Methodologies for Penetration Testing
These days cyber attacks occur not only in large companies but also in small businesses in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, India etc accordingRead More →
Data Security News | Infosec Blog | Information Security Tutorials
These days cyber attacks occur not only in large companies but also in small businesses in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, India etc accordingRead More →
Flaw allowed anyone to edit & take control over .as domains. A British security researcher that goes online only by the name of InfoSec Guy revealed today that American Samoa domainRead More →
Yesterday, a new ransomware called TrueCrypter was discovered by AVG malware analyst Jakub Kroustek. This ransomware encrypts your data using AES-256 encryption and then demands either .2 bitcoins or $115 USD inRead More →
Recently we observed an Android malware family being used to attack users in Russia. The malware samples were mainly distributed through a series of malicious subdomains registered under a legitimateRead More →
Unknown group attacked South East Asian targets, sometimes for years at a time. Microsoft’s Windows Defender Advanced Threat Hunting team works to track down and identify hacking groups that perpetrate attacks. TheRead More →
A list containing hundreds of Spotify account credentials – including emails, usernames, passwords, account type and other details – has popped up on the website Pastebin, in what appears to beRead More →
This is a hardware True Random Number Generator that attaches via USB. Version 0.3 This one uses the better noise source coupled with an op amp that provides 2MHz ofRead More →
Windows comes with a tool called the Windows Management Instrumentation, or WMI, that can be used by system administrators to receive information and notifications from Windows. Using WMI, an administratorRead More →
The hackers behind a large-scale Bangladesh bank hack went further than simply stealing money. Now it turns out that they created malware that could compromise the internationally used SWIFT paymentRead More →
The Defense Advanced Research Projects Agency is calling for the development of a hacker-proof encryption App for the U.S. military. The US Defense Advanced Research Projects Agency (DARPA) is calling securityRead More →
This guide is written for anyone wo is practicing hiw penetration skills using the Metasploitable 2. The problem that we are facing here is that we have to penetrate toRead More →
Attackers have been successfully deploying RATs for years to remotely control users systems – giving them full access to the victim’s files or resources such as cameras, recording key strokes,Read More →
Can you believe it! A mere $10 second hand router was responsible for the massive $80 million Bangladesh Bank hack. Back in February, hackers had managed to hack into one ofRead More →
The number of people accessing Facebook via the “dark web” now stands at 1 million per month, the tech giant announced today (April 22). Facebook has maintained an “Onion” siteRead More →
Exploit kit’s inner workings exposed as researchers help shut down its servers. Security researchers at Cisco Talos and Check Point have published reports detailing the inner workings of Nuclear, an “exploitRead More →
State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid the detection. Security experts from SentinelOne spotted nation-state actors in Asia running espionageRead More →
How I Hacked Facebook, and Found Someone’s Backdoor Script(English Version) Foreword As a pentester, I love server-side vulnerabilities more than client-side ones. Why? Because it’s way much cooler to takeRead More →
Approach relies on already installed code, including widely used glibc library. New research into the “Rowhammer” bug that resides in certain types of DDR memory chips raises a troubling new prospect:Read More →
Following WhatsApp’s move to add end-to-end encryption to its platform, another big messaging company is joining the wave of apps turning on expanded privacy features.Viber — a messaging app with 711 million+ usersRead More →
When it comes to cybersecurity, it would appear that the best offense is a good defense, and by and large we have neither. Following a damning report of the U.S.Read More →