How these two women hacked into banks through an ATM and robbed millions
One of the features that has evolved the most in the world of cybercrime is the ability of hackers to compromise banking systems and spoil the security of ATMs toRead More →
One of the features that has evolved the most in the world of cybercrime is the ability of hackers to compromise banking systems and spoil the security of ATMs toRead More →
Cybersecurity specialists report the detection of four critical vulnerabilities in Hyperion Infrastructure Technology, a centralized solution for financial and operational planning in enterprise environments developed by the technology firm Oracle.Read More →
An Iran-based hacking group has spent about a year and a half operating a hacking campaign in which they pose as aerobics instructors in order to spy on and infectRead More →
Collecting information is an important phase for investigation. Now days whenever user visits any blogger websites. Many websites ask for email addresses for giving notification regarding their content. Such websitesRead More →
Cybersecurity experts report the discovery of two vulnerabilities in Zimbra, a webmail platform used by more than 200 thousand organizations worldwide. According to the report, the combined exploitation of theseRead More →
A recent report states that Justdial, one of the largest service companies in India, has suffered a data breach that led to the exposure of confidential records of more thanRead More →
After multiple reports and rumors, Transnet Port Terminals (TPT) confirmed a cyberattack that affected its entire it infrastructure. As some will recall, Transnet Group is the operator of state portsRead More →
A recent report claims that the vulnerability affecting Checkbox Survey, a tool ASP.NET to add survey functionality to websites, was exploited by a hacking group sponsored by the Chinese governmentRead More →
Cybersecurity specialists report the discovery of two critical vulnerabilities in Asterisk, a popular open source Voice over Internet Protocol (VoIP) telephony solution that provides call center functions. According to theRead More →
Cybersecurity specialists report the discovery of multiple vulnerabilities in biometric access control devices developed by French multinational IDEMIA. According to the report, successful exploitation of these vulnerabilities would allow threatRead More →
French cybersecurity specialist Gilles Lionel reported the discovery of a serious vulnerability in the Windows operating system that would allow threat actors to arbitrarily authenticate to remote Windows servers inRead More →
Tor is the most famous web browser which provides anonymity/ privacy over the internet. Many companies/ whistle blowers uses TOR for working anonymously. Some Hacking groups also uses TOR servicesRead More →
Information gathering phase shows how an pentester should prepare for his next phases. Because in this phase pentester have to collect information about their target as much possible. Their areRead More →
Wireless Networks Wireless network which enables end-point devices to communicate with internet by connecting to an AP device. Wiresless device are also referred as WLAN devices. Accessing Wireless Networks YouRead More →
Cybersecurity specialists report the detection of a critical vulnerability in Fail2ban, an application written in Python for the prevention of intrusions in a given system. According to the report, thisRead More →
Full user records of Guntrader.uk, a British website for buying and selling rifles are available on the dark web as a result of a security incident. The website administrators reportedRead More →
Apple announced the release of an emergency update in order to address some recently detected security flaws, including a couple errors that can be exploited remotely. Users need to upgradeRead More →
Even the most successful traders have been exposed to extreme hacking attempts in the last few years which has made many beginner and experienced traders doubt the security of onlineRead More →
A research team from ETH Zurich and Royal Holloway published a report detailing the discovery of multiple vulnerabilities in the cryptographic protocol of Telegram, one of the most popular messagingRead More →
In its most recent report, the Cybersecurity and Infrastructure Security Agency (CISA) alerted users of Pulse Secure devices to the discovery of at least 13 malware samples found on affectedRead More →