Jok3r, one tool to do all hacking
In most of the cases pentesting is done manually. Where pentester uses all the tools available over the internet to find bugs or vulnerabilities in web applications, mention ethical hackingRead More →
In most of the cases pentesting is done manually. Where pentester uses all the tools available over the internet to find bugs or vulnerabilities in web applications, mention ethical hackingRead More →
Malicious hackers have infected some torrents on this platform with a malware functional in Windows operating systems Although in general this practice does not generate major drawbacks, experts in networkRead More →
This new and sophisticated malicious software is able to bypass the best security measures A new ransomware family discovered at the beginning of 2019 has generated alarm among the cybersecurityRead More →
A malicious user could perform a Man-in-The-Middle attack to extract user’s sensitive information Network security and ethical hacking specialists from the International Institute of Cyber Security report the finding ofRead More →
Cyberactivists have announced the release of a massive archive with leaked information from Russian oligarchs and journalists According to network security and ethical hacking specialists from the International Institute ofRead More →
The rating agency will evaluate the propensity of large organizations to suffer information security incidents A data breach, depending on the magnitude of the incident, and its corresponding fines orRead More →
APT, one of the major Linux software installation programs, presents a serious security flaw Users willing to install programs in Linux distributions such as Debian, Ubuntu, or Mint, usually resortRead More →
The false news sowed panic in a family of the United States east coast An unusual incident altered the peace of a family in the United States, report network securityRead More →
An unknown attacker has exploited this weakness to deploy multiple malicious email campaigns At the end of last year a campaign of bomb threats via email provoked massive evacuations andRead More →
A combination of two exploits allows attackers to install malicious code on IPhone X devices A network security researcher from China has recently revealed technical details about some critical vulnerabilityRead More →