Skip to content

Information Security Newspaper

Secondary Navigation Menu
Menu
  • Home
  • Data Security
    • Mobile Security
    • Technology
    • Important
  • Vulnerabilities
  • Tools
    • Network Tools
      • DNSMap
      • DNSENUM
      • URLCRAZY
      • DNSRECON
      • DNSTRACER
      • TWOFI
      • ONIOFF
      • EXITMAP
      • PROXYCHAINS
      • DIG
      • NSLOOKUP
      • john the ripper
      • P0f
      • Sparta
      • arpSpoof
      • Photon
      • Justsniffer
      • Trevorc2
      • Vemon
      • GoScan
      • Masscan
      • OSNIT-Search
      • nbtstat
    • Web Scanners
      • NIKTO
      • HTTRACK
      • WAPITI
      • Fierce
      • GoBuster
      • w3af
      • DIRBUSTER
      • WPSCAN
      • Joomscan
      • WHATWEB
      • MassBleed
      • CRUNCH
    • Android
      • TheFatRat
      • EvilDroid
      • ANDROID DEBUG BRIDGE(ADB) – Part I
      • ANDROID DEBUG BRIDGE(ADB) – Part II
    • OSINT Tools
      • THEHARVESTER
      • DATASPLOIT
      • recon-ng
      • Babysploit
      • Shodan
      • Trape
      • Infoga
      • Metagoofil
      • Zoomeye
      • Devploit
      • Tinfoleak
      • BadMod
      • H8mail
      • Stardox
    • CTF Tools
    • CTF Challenges
      • Mr. Robot 1, walk through
    • DDoS Tools
    • Defense Evasion Tools
      • Getwin
    • Forensics
      • Steghide LSBstege
      • knock
    • Hash Cracking Hacking Tools
      • twofi
      • John the Ripper
      • Crunch
    • Linux Utilities
      • Terminator
      • Procdump
      • Termshark
    • Malware Analysis
      • AUTOMATER
      • Shed
    • Reverse Engineering Tools
    • Anonymity Tools
      • onioff
      • Proxychains
      • Exitmap
      • Deep Explorer
      • Hosting your own .onion domain
      • Send Anonymous Emails
      • OnionShare – startup in dark web
    • Vulnerability Scanners
      • Pocsuite
      • Mercury
      • Jok3r
      • FreeVulnsearch
      • Pompem
      • Phantom Evasion
    • Web Exploitation
      • XSS Shell
      • Wafw00f
      • Remote3d
    • Web Scanners
    • Windows Utilities
      • ENUM4LINUX
      • NETBIOS ENUMERATOR
      • Medusa
    • Wireless Hacking
      • Wigle
      • WiFiBroot
      • Hashcat
      • Aircrack-ng
    • Social Engineering Tools
      • blackeye
      • Seeker
      • BYOB
      • QRLJacker
      • phemail
      • Cuteit
      • Spooftel
  • Incidents
  • Malware
  • News Videos
  • Facebook
  • Twitter
  • YouTube
  • Telegram

Fake cryptocurrency trading apps on Google Play

2017-10-23
On: October 23, 2017
In: Mobile Security

Users of the popular cryptocurrency exchange Poloniex have been the target of two credential stealing apps, discovered on Google Play disguised as legitimate Poloniex mobile apps. Apart from harvesting Poloniex login credentials,Read More →

NetBSD security improved with the implementation of kernel ASLR (KASLR)

2017-10-23
On: October 23, 2017
In: Data Security

The development team at NetBSD is going to implement the KASLR (kernel Address Space Layout Randomisation) for 64-bit AMD processors. The KASLR coding technique allows randomizing the location of memory whereRead More →

Pi-Top is a Raspberry Pi powered modular laptop to help learn coding and hardware hacks

2017-10-23
On: October 23, 2017
In: Incidents

Learn to code with DIY Modular laptop Pi-Top powered by Raspberry Pi. The Rasberry Pi has been popular with hobbyists right since its first iteration in 2012 when it was a singleRead More →

US warns of ongoing attacks on energy firms and critical infrastructure

2017-10-23
On: October 23, 2017
In: Incidents, Vulnerabilities

The United States Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have issued a warning that malicious hackers are actively targeting government departments, and firms workingRead More →

Hack These Apps And Earn $1,000 — Bug Bounty Program Launched By Google And HackerOne

2017-10-21
On: October 21, 2017
In: Vulnerabilities

Google has announced a bug bounty program called ‘Google Play Security Reward Program’ to detect flaws in Android apps. Security experts have the chance to win $1,000 by finding vulnerabilities in theRead More →

Assemblyline – Canada’s CSE intelligence Agency releases its malware analysis tool

2017-10-21
On: October 21, 2017
In: Malware

Canada’s Communications Security Establishment (CSE) intel agency has released the source code for one of its malware analysis tools dubbed Assemblyline. The Canada’s Communications Security Establishment (CSE) intelligence agency hasRead More →

“Security concerns” lead to LTE service shutdown on Chinese Apple Watches

2017-10-21
On: October 21, 2017
In: Data Security

The Chinese government doesn’t know what to do with eSIMs yet. Apple’s struggles in China continue to mount, and this time, it’s Apple’s newest wearable causing problems for the company. According toRead More →

Malware in firmware: how to exploit a false sense of security

2017-10-20
On: October 20, 2017
In: Malware

When it comes to cyberthreats, we in ESET-LATAM Research often see ransomware, banking trojans (especially in my home country – Brazil), botnets or worms. As a consequence, other types ofRead More →

OSX/Proton spreading again through supply-chain attack

2017-10-20
On: October 20, 2017
In: Incidents

During the last hours, ESET researchers noticed that Eltima, the makers of the Elmedia Player software, have been distributing a version of their application trojanized with the OSX/Proton malware on their official website.Read More →

Necurs Botnet malspam pushes Locky using DDE attack

2017-10-20
On: October 20, 2017
In: Vulnerabilities

I’ve seen Twitter traffic today about malspam from the Necurs Botnet pushing Locky ransomware using Word documents as their attachments.  These Word documents use the DDE attack technique, something I already wroteRead More →

Magnitude Exploit Kit Now Targeting South Korea With Magniber Ransomware

2017-10-20
On: October 20, 2017
In: Incidents

A new ransomware is being distributed by the Magnitude exploit kit: Magniber (detected by Trend Micro as RANSOM_MAGNIBER.A and TROJ.Win32.TRX.XXPE002FF019), which we found targeting South Korea via malvertisements on attacker-owned domains/sites. TheRead More →

Attacking a co-hosted VM: A hacker, a hammer and two memory modules

2017-10-20
On: October 20, 2017
In: Vulnerabilities

Row-hammer is hardware bug that can cause bit-flips in physical RAM. Mark Seaborn and Thomas Dullien were the first to exploit the DRAM row-hammer bug to gain kernel privileges. Kaveh Razavi et al. pushed the exploitation ofRead More →

Securing printed data in the ‘paperless’ office

2017-10-18
On: October 18, 2017
In: Incidents, Vulnerabilities

While we are supposedly in the era of the paperless office, intentional leaks via printed documents remain very common and can be just as damaging as their digital counterparts. WhileRead More →

Google introduces new Advanced Protection feature to protect its users

2017-10-18
On: October 18, 2017
In: Incidents

Google continues working to improve the security of its users, the last measure introduced by the company it the ‘Advanced Protection’ feature. The Advanced Protection feature was designed to improve theRead More →

Microsoft never disclosed 2013 hack of secret vulnerability database

2017-10-18
On: October 18, 2017
In: Vulnerabilities

Database contained details required to carry out highly advanced software attacks. Hackers broke into Microsoft’s secret, internal bug-tracking database and stole information related to vulnerabilities that were exploited in laterRead More →

BlackOasis APT leverages new Flash zero-day exploit to deploy FinSpy

2017-10-18
On: October 18, 2017
In: Vulnerabilities

Security researchers from Kaspersky Labs spotted the BlackOasis APT group exploiting a new zero-day RCE vulnerability in Adobe Flash. Security researchers from Kaspersky Labs have discovered a new zero-day remote code executionRead More →

ATM malware is being sold on Darknet market

2017-10-17
On: October 17, 2017
In: Malware

ATM systems appear to be very secure, but the money can be accessed fairly easily if you know what you are doing. Criminals are exploiting hardware and software vulnerabilities toRead More →

Even With The Best Email Spoofing Defences in The World, HMRC is Spoofed

2017-10-17
On: October 17, 2017
In: Vulnerabilities

Even with the most advanced email protections in place and an entire government organization to support them, the bad actors were able to spoof Her Majesty’s Revenue and Customs (HMRC)Read More →

These fake tax documents spread jRAT malware

2017-10-17
On: October 17, 2017
In: Malware

Data hungry malware tries to hook you with bogus forms and fake PDFs. jRAT malware users targeted US taxpayers with fake IRS tax documents, and now the same trick is beingRead More →

ROCA: Vulnerable RSA generation (CVE-2017-15361)

2017-10-17
On: October 17, 2017
In: Vulnerabilities

A newly discovered vulnerability in generation of RSA keys used by a software library adopted in cryptographic smartcards, security tokens and other secure hardware chips manufactured by Infineon Technologies AGRead More →

Posts pagination

Previous 1 … 262 263 264 … 415 Next

Latest Videos

How Hackers Intercept Mobile OTP and Calls Without ‘Hacking’ — The Shocking Power of SIM Boxes

TunnelCrack: Two serious vulnerabilities in VPNs discovered, had been dormant since 1996

How to easily hack TP-Link Archer AX21 Wi-Fi router

US Govt wants new label on secure IoT devices or wants to discourage use of Chinese IoT gadgets

24,649,096,027 (24.65 billion) account usernames and passwords have been leaked by cyber criminals till now in 2022

View All

Vulnerabilities

How to hack the current version of Windows in 5 minutes

Learn how hackers code zero-days and make money

This Hidden Comet/Atlas AI Browser Flaw That Hackers Are Exploiting

How to Use Google’s OSS Rebuild: A New Open Source Software Supply Chain Security Tool

MFA? Irrelevant. CitrixBleed 2 Lets Hackers Take Over Without Logging In

View All

Tutorials

Learn how hackers code zero-days and make money

What are “Bulletproof VPN” vs “No Logs VPN”

How Scammers Make Fake Calls? (Step-by-Step Explained)

Best Free VPN Apps

Your WiFi Router might be watching your movements at home?

Recover Deleted Photos from Mobile – Top 5 Free Android Apps

The Process of Tracing People on the Internet

Forget Metasploit: Inside Predator’s Zero-Click Advertising-Driven Phone Hacking System

How Hackers Intercept Mobile OTP and Calls Without ‘Hacking’ — The Shocking Power of SIM Boxes

13 Insanely Easy Techniques to Hack & Exploit Agentic AI Browsers

How to Use Google’s OSS Rebuild: A New Open Source Software Supply Chain Security Tool

Phishing 2.0: AI Tools Now Build Fake Login Pages That Fool Even Experts

How TokenBreak Technique Hacks OpenAI, Anthropic, and Gemini AI Filters — Step-by-Step Tutorial

Comparing Top 8 AI Code Assistants: Productivity Miracle or Security Nightmare. Can You Patent AI Code Based App?

No Login Required: How Hackers Hijack Your System with Just One Keystroke: utilman.exe Exploit Explained

How to Send DKIM-Signed, 100% Legit Phishing Emails — Straight from Google That Bypass Everything

A Malware That EDR Can’t See?If You Rely on Antivirus for Protection, Read This Before It’s Too Late!

WinRAR and ZIP File Exploits: This ZIP File Hack Could Let Malware Bypass Your Antivirus

View All

Malware

Live Malware Code Mutation: How AI Generates Evasive Malware

Backdooring ATMs via Bootloader? These Hackers Showed It’s Still Possible in 2025”

How Lynx Ransomware Extorts Millions from U.S. Companies

A Malware That EDR Can’t See?If You Rely on Antivirus for Protection, Read This Before It’s Too Late!

Top 2 Malicious Python Packages You Must Avoid! Zebo-0.1.0 & Cometlogger-0.1

View All

Cyber Security Channel

How to easily hack TP-Link Archer AX21 Wi-Fi router

US Govt wants new label on secure IoT devices or wants to discourage use of Chinese IoT gadgets

24,649,096,027 (24.65 billion) account usernames and passwords have been leaked by cyber criminals till now in 2022

  • Facebook
  • Twitter
  • YouTube
  • Telegram
  • Foursquare
info@securitynewspaper.com    Privacy Policy
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.