How to DDos deepweb .onion sites in just 4 commands?
A denial of service (DoS) attack is to force a failure of the target system by creating a condition in which users cannot access the attacked servers. A successful attackRead More →
A denial of service (DoS) attack is to force a failure of the target system by creating a condition in which users cannot access the attacked servers. A successful attackRead More →
The PrintNightmare vulnerability has turned out to be a big issue for Windows system users and the cybersecurity community. On Tuesday, Microsoft seemed to have finally addressed this flaw withRead More →
Nikita Abramov, a researcher at security firm Positive Technologies, issued an alert regarding CVE-2021-20026, a command injection vulnerability in Network Security Manager (NSM) solutions, produced by SonicWall. Updates to addressRead More →
Operation Lyrebird, deployed by the international police agency Interpol in collaboration with infosec firm Group-IB, led to the arrest of one of the most wanted threat actors in the worldRead More →
It has been more than two years since Google decided to definitively close its social network Google+, although apparently the history of this platform did not end with the company’sRead More →
After a long time of suspicion, a group of researchers confirmed that Audacity, the open source software for audio editing, stores its users’ information on the system and could alsoRead More →
The operators of the REvil ransomware, one of the most dangerous hacking groups in the world, have deployed a massive new operation. This time, the victim is software development firmRead More →
Cybersecurity specialists report the discovery of a critical vulnerability in Medisol, a medical services management system developed by the technology firm Codester. The flaw has yet to be addressed byRead More →
A recent security report states that it is possible to hijack sessions on Google Compute Engine virtual machines to gain root access through a DHCP attack. While deploying this attackRead More →
Just a few hours ago it was revealed that a JSON database with over 68 MB of data extracted from LinkedIn is available on a popular dark web hacking forum.Read More →