Over 90 million of stolen accounts for sale on dark web
A hacker offers personal details of users of some sites in exchange for Bitcoin transfers A hacker active on dark web known as “Gnosticplayers” has become relevant recently due toRead More →
A hacker offers personal details of users of some sites in exchange for Bitcoin transfers A hacker active on dark web known as “Gnosticplayers” has become relevant recently due toRead More →
There are many tools available which can find exploits. These tools are more often works on automated way. As they show results in very short period of time. Nowdays mostRead More →
Shodan is very popular to search for vulnerable devices over the internet. As shodan ping all the devices which are connected to the internet. Shodan shows each and every portRead More →
Sniffing is an essential phase in pentesting. Many times security researchers/ pentesters wants to sniff their target so they can prepare more better for further phases, as per ethical hackingRead More →
Around 120 service providers are exposed to attacks due to a non-updated vulnerable plugin A group of hackers exploited a vulnerability revealed a couple of years ago in a softwareRead More →
A group of hackers claims to have compromised various public interest institutions in Spain The digitalization of administrative processes progresses little by little, although specialists in network security from theRead More →
In a matter of minutes users lose hundreds of followers and followed accounts According to network security and ethical hacking specialists from the International Institute of Cyber Security, Instagram hasRead More →
All the services of the Bank of Valletta have been interrupted The Bank of Valletta, Malta, shut down all of its operations and communications, including the closure of its ATMsRead More →
Technical details about the vulnerability are still unknown Coinbase, the popular cryptocurrency exchange, has just awarded a $ 30k USD bounty to a hacker for the discovery of a criticalRead More →
Various Linux distributions might be affected by this security issue Critical privilege-escalation vulnerability could grant total control of the system compromised to attackers. According to network security and ethical hackingRead More →
Bad news for match seekers Valentine’s Day began with awful news for users of the dating app called Coffee Mets Bagel, according to network security and ethical hacking specialists fromRead More →
A Reddit user found a way to bypass advertising on the platform with a tool available on the latest MacBook Pro A user of the Reddit platform called “u/BiggerBadgers” discoveredRead More →
Scanning is the initial phase of pentesting. Security researchers/ pentesters are very well aware of this phase. This is the phase where pentester spend most of the time. As thisRead More →
To exploit the vulnerability, attackers need physical access to the computer, as well as installing a malicious application Network security and ethical hacking specialists from the International Institute of CyberRead More →
The company discovered a severe security flaw during a routine process Cisco has notified its customers that it is necessary to install an update to correct a critical vulnerability thatRead More →
A group of experts published their research on this attack Network security and ethical hacking specialists from the International Institute of Cyber Security report the emergence of the first functionalRead More →
It took over six months for the company to detect and report the incident The 500px photography hosting platform has publicly disclosed that it suffered a data breach in theRead More →
The banking institution claims that the data and assets of its customers are safe According to network security and ethical hacking specialists from the International Institute of Cyber Security, theRead More →
United Kingdom authorities have determined that the visualization or transmission of this kind of content is illegal Legislation recently adopted in the United Kingdom states that accessing to online terroristRead More →
Vulnerability has a score of 7.2/10 on the CVSS scale Linux system users are dealing with a new threat. According to network security and ethical hacking specialists from the InternationalRead More →