Over 90 million of stolen accounts for sale on dark web
A hacker offers personal details of users of some sites in exchange for Bitcoin transfers A hacker active on dark web known as “Gnosticplayers” has become relevant recently due toRead More →
A hacker offers personal details of users of some sites in exchange for Bitcoin transfers A hacker active on dark web known as “Gnosticplayers” has become relevant recently due toRead More →
There are many tools available which can find exploits. These tools are more often works on automated way. As they show results in very short period of time. Nowdays mostRead More →
Shodan is very popular to search for vulnerable devices over the internet. As shodan ping all the devices which are connected to the internet. Shodan shows each and every portRead More →
Sniffing is an essential phase in pentesting. Many times security researchers/ pentesters wants to sniff their target so they can prepare more better for further phases, as per ethical hackingRead More →
Around 120 service providers are exposed to attacks due to a non-updated vulnerable plugin A group of hackers exploited a vulnerability revealed a couple of years ago in a softwareRead More →
A group of hackers claims to have compromised various public interest institutions in Spain The digitalization of administrative processes progresses little by little, although specialists in network security from theRead More →
In a matter of minutes users lose hundreds of followers and followed accounts According to network security and ethical hacking specialists from the International Institute of Cyber Security, Instagram hasRead More →
All the services of the Bank of Valletta have been interrupted The Bank of Valletta, Malta, shut down all of its operations and communications, including the closure of its ATMsRead More →
Technical details about the vulnerability are still unknown Coinbase, the popular cryptocurrency exchange, has just awarded a $ 30k USD bounty to a hacker for the discovery of a criticalRead More →
Various Linux distributions might be affected by this security issue Critical privilege-escalation vulnerability could grant total control of the system compromised to attackers. According to network security and ethical hackingRead More →