fbpx
Home News

News

11. Python For Hackers – Reverse HTTP Shell Testing

Whats Inside : In this video we are going to create a reverse http shell that will download data . Github Project Files : https://goo.gl/FLENRY Help...

A Critical Vulnerability in Inteno Routers

Security researchers are warning users regarding new critical vulnerabilities in Inteno routers, which could allow remote attackers to replace the firmware on a device...

WikiLeaks Under Cyber Attack Due to Recent Failed Turkish Military Coup

On Monday July 18th, WikiLeaks tweeted about that they are going through a sustained attack on their infrastructure. All this start happening has after...

Malware Stealing Money by Pretending to be Whatsapp, GooglePlay and Other Famous Apps

Hackers always seek to steal money from credit cards and other financial information. They are actively stealing credit card and other financial information using malware. In Europe,...

OurMine Hacked CEO of Google and Others

Earlier this month, we heard that Facebook CEO Mark Zuckerberg’s Twitter, Instagram and Pineterest accounts got hacked by a hacker group “OurMine”. The hacker...

US Teen Got Internship Offer after Hacking Pentagon’s Website

A high school graduate from Washington DC has been offered an internship by the Secretary of Defense Ash Carter. The Teen reportedly hacked into...

Locky ransomware got hacked

Locky ransomware has raising destruction all over the world for past two months. Security researchers has already rated Locky as one of the most...

Security researchers discovered 2900 new Ransomwares – Report

This era of technology will forever be remembered as the era when Ransomwares ruled the world. A security researcher from Kespersky Lab explained how...

World’s youngest bounty winner lands $10,000 prize after hacking Instagram

A 10 year old Finish kid named Jani has won $10,000 prize money after he hacked into Instagram servers. Facebook the principal company has...

Linux Foundation introduces program to address open-source security issues

The Linux Foundation has launched a new open-source security program; which will boost the security of open-source software. In an announcement today by company;...

Qatar National Bank Hacked; confidential data stolen by politically backed hackers

Qatar National Bank (QNB) has been targeted by the hackers; which have led to the 1.4GB of confidential data breach. The leaked data include...

IoT spending will reach $348 Million this year – Gartner Report

Cyber Security is the most lucrative business of this decade this makes security professionals the best paid people on the earth. The latest report...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...