Home News

News

11. Python For Hackers – Reverse HTTP Shell Testing

Whats Inside : In this video we are going to create a reverse http shell that will download data . Github Project Files : https://goo.gl/FLENRY Help...

A Critical Vulnerability in Inteno Routers

Security researchers are warning users regarding new critical vulnerabilities in Inteno routers, which could allow remote attackers to replace the firmware on a device...

WikiLeaks Under Cyber Attack Due to Recent Failed Turkish Military Coup

On Monday July 18th, WikiLeaks tweeted about that they are going through a sustained attack on their infrastructure. All this start happening has after...

Malware Stealing Money by Pretending to be Whatsapp, GooglePlay and Other Famous Apps

Hackers always seek to steal money from credit cards and other financial information. They are actively stealing credit card and other financial information using malware. In Europe,...

OurMine Hacked CEO of Google and Others

Earlier this month, we heard that Facebook CEO Mark Zuckerberg’s Twitter, Instagram and Pineterest accounts got hacked by a hacker group “OurMine”. The hacker...

US Teen Got Internship Offer after Hacking Pentagon’s Website

A high school graduate from Washington DC has been offered an internship by the Secretary of Defense Ash Carter. The Teen reportedly hacked into...

Locky ransomware got hacked

Locky ransomware has raising destruction all over the world for past two months. Security researchers has already rated Locky as one of the most...

Security researchers discovered 2900 new Ransomwares – Report

This era of technology will forever be remembered as the era when Ransomwares ruled the world. A security researcher from Kespersky Lab explained how...

World’s youngest bounty winner lands $10,000 prize after hacking Instagram

A 10 year old Finish kid named Jani has won $10,000 prize money after he hacked into Instagram servers. Facebook the principal company has...

Linux Foundation introduces program to address open-source security issues

The Linux Foundation has launched a new open-source security program; which will boost the security of open-source software. In an announcement today by company;...

Qatar National Bank Hacked; confidential data stolen by politically backed hackers

Qatar National Bank (QNB) has been targeted by the hackers; which have led to the 1.4GB of confidential data breach. The leaked data include...

IoT spending will reach $348 Million this year – Gartner Report

Cyber Security is the most lucrative business of this decade this makes security professionals the best paid people on the earth. The latest report...
- Advertisment -

Most Read

The Ultimate Blockchain & Bitcoin Guide

Let us start with a scenario. Whenever there is an election, we always hear the rumor that there is rigging in the election. In...

5 Top Cybersecurity Career Paths & Certifications

We are living in a world of innovations. Now, imagine innovative technologies with zero security is such a big nightmare. Cybersecurity comes here for...

How to Become a Certified Ethical Hacker (CEH)?

Data security becomes more important in running a successful business since persistent threats, hacks, and data breaches happening to an organization’s data. Every organization...

How to Tell if an Online Casino is Safe

Before the UK government established the Gambling Commission in 2005, online gambling was generally unregulated. Sure, Curacao and Malta had regulatory agencies at the...

LOOKING FOR HACKING RECIPES FORM THE PRO?

Then sign up for FREE to the ehacking’s exclusive group. You will get the exclusive tips/tricks, tutorials, webinars & courses that I ONLY share with my fellow on this exclusive newsletter.