Top 11 extensions to turn your browser into an advance hacking tool
Web browsers are one of the most widely used tools by people around the world, whether or not they have hacking skills or minimal computer skills. However, we may notRead More →
Web browsers are one of the most widely used tools by people around the world, whether or not they have hacking skills or minimal computer skills. However, we may notRead More →
Operators of the Clop ransomware (also identified as Cl0p) posted an update on their website to claim that they managed to access confidential information from students and staff from theRead More →
The number of privacy breaches related to Internet of Things (IoT) devices has increased considerably during the pandemic isolation period. This time, cybersecurity experts report that a Chinese hacking groupRead More →
VMware security teams announced the release of some security patches to fix a severe flaw in vRealize Operations whose exploit would allow threat actors to steal administrator credentials on vulnerableRead More →
In an unprecedented event, Chinese authorities have dismantled one of the most important groups in the world of videogame hacking, responsible for developing cheating software for many of today’s mostRead More →
Cybersecurity specialists report that Intel is facing a class action lawsuit for violating an anti-wiretapping law in the state of Florida, US. The plaintiffs argue that the company hid softwareRead More →
The world of videogames has become a highly competitive environment, leading many gamers to take drastic steps to stand out from the rest. A recent report mentions that two ApexRead More →
The US Department of Justice (DOJ) revealed that over the most recent months, a total of 474 individuals have been legally prosecuted for their participation in various fraudulent COVID-19 relatedRead More →
In a recent supply chain attack, threat actors managed to compromise the official Github repository of PHP, manipulating the code base to send malicious acknowledgments to the php-sc Git repository,Read More →
Cybersecurity specialists reported the finding of two severe vulnerabilities in Linux-based operating systems that could allow threat actors to bypass the mitigations implemented to prevent Spectre and Meltdown attacks, leadingRead More →