Hackers spread Android spyware through Facebook using Fake profiles
The Android spyware was used to steal personal data of victims – The campaign also shows why users should never use their real photos on Facebook. There are almostRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
The Android spyware was used to steal personal data of victims – The campaign also shows why users should never use their real photos on Facebook. There are almostRead More →
Dr. Mine is a script programmed in NodeJS designed specially to help the detection of the cryptocurrency mining in the different webs that we are going to visit. According to cyberRead More →
Researchers said they found cyptojacking code hidden on the Los Angeles Times’ interactive Homicide Report webpage that was quietly harnessing visitors’ CPUs to mine Monero cryptocurrency. The cryptojacking incident wasRead More →
Crowbar is a tool that is specifically developed to perform brute force attacks during pentesting tests. This tool applies brute force attacks differently than other tools that already exist. TodayRead More →
Researchers are warning users about the Coldroot remote access Trojan that is going undetected by AV engines and targets MacOS computers. The RAT is cross-platform and capable of planting aRead More →
A Network Forensics Tool: to visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction PcapXray Design Specification Objective: The cyber security expert, withRead More →
FedEx customer data has been exposed online, thanks to unsecured AWS S3 bucket. In July 2017, FedEx Corporation announced that its subsidiary company TNT Express was facing issues due toRead More →
Another day, another data breach – This time it is Retina-X Studios, a well know spyware developing firm. There are different types of hackers, some hack for profit while some hackRead More →
The free VPN of Facebook called Onavo has been dedicated for five years to collect private information of its users, such as installed applications or Internet browsing habits, according toRead More →
Last week companies specialized in cyber security discovered the existence of a new Persistent Advanced Threat APT, supposedly sponsored by Dark Caracal, an organization dedicated to espionage. Since 2012, he has performedRead More →