Menu

Blog

Trusted source of Cyber-Security and Ethical Hacking
Adobe Magento Marketplace has been HackedLatest News
Adobe Magento Marketplace has been Hacked

Adobe disclosed today a security breach that impacted users registered on the company's Magento Marketplace, a portal for buying, selling, and downloading [...]

AdobeMagentoMarketplaceMageIDEcommerceBreaches
DeathRansom the latest Discovered RansomwareLatest News
DeathRansom the latest Discovered Ransomware

Latest ransomware known as DeathRansom began with a shaky beginning, but has solved the issues now, starting to infect victims and encrypting their files. [...]

DeathRansomCyber-AttackNetworkExploitationRansomWare
How to Extract Data from Windows Memory Dump using VolatilityDigital Forensics
How to Extract Data from Windows Memory Dump using Volatility

In terms of Digital Forensic, there are many tools that can be used to extract valuable and sensitive information directly from the memory (RAM) of a [...]

VolatilityMemoryRAMWindowsHashBitlockerDump
How Hackers Exploit BlueKeep Vulnerability on Windows ServersExploitation
How Hackers Exploit BlueKeep Vulnerability on Windows Servers

BlueKeep is a security vulnerability that was discovered in Microsoft's Remote Desktop Protocol implementation of Windows 2008 R2 and Windows 7

MoneroBlueKeepMetasploitReverseDumpWindows
Huge Leaks 1.2 Billion Account Data Exposed OnlineLatest News
Huge Leaks 1.2 Billion Account Data Exposed Online

Dark web investigator Vinny Troia discovered one such cache lying uncovered and easily accessible on an unsecured server about 1.2 billion records of personal [...]

FacebookLinkedinInstagramTwitterGithubVinny TroiaDataleak
Doppelpaymer Ransomware was not distributed via Bluekeep ExploitLatest News
Doppelpaymer Ransomware was not distributed via Bluekeep Exploit

The Doppelpaymer ransomware that went around with companies this month was not spread through the BlueKeep vulnerability. Microsoft has debunked those rumors [...]

DoppelpaymerCryptominerBotnetNetworkBlueKeepRansomWare
ACbackdoor a Malware that Infects both Windows and Linux SystemsLatest News
ACbackdoor a Malware that Infects both Windows and Linux Systems

Recently, a malware named ACbackdoor has been discovered which infects both Windows and Linux based with capabilities of pretty complex operations which [...]

ACbackdoorLinuxWindowsTrojanVirusMalware
WhatsApp MP4 Videos Flaw allows Hackers to execute Code RemotelyLatest News
WhatsApp MP4 Videos Flaw allows Hackers to execute Code Remotely

A new bug on Whatsapp, based on MP4 videos flaws, has been revealed by Facebook. This vulnerability could lead to denial of service attacks or remote code [...]

FacebookWhatsAppFlawVideoVulnerabilityCVEMP4
How to Create a Keylogger for Linux using PythonSniffing/Spoofing
How to Create a Keylogger for Linux using Python

Some recent studies estimate that between 100 to 150 million computers worldwide would be directly infected by at least one malware such as Trojan or Keylogger.

KeyloggerPythonKeystrokesEventsCrontabTrojan
Hacker Publishes 2TB of Data from Cayman National BankLatest News
Hacker Publishes 2TB of Data from Cayman National Bank

A hacker, known as Phineas Fisher, has published more than 2TB of data from the Cayman National Bank. This includes more than 640,000 emails and the data of [...]

CaimanBankDataleakPhineas FisherHackingBreaches
Pipka Self-Cleaning Payment Malware Infects Ecommerce SitesLatest News
Pipka Self-Cleaning Payment Malware Infects Ecommerce Sites

The Pipka script, recently discovered by researchers at Visa is capable of self-destructing after executing its code on a website, making it very difficult to [...]

PipkaEcommerceSkimmerCobaltFIN6JavaScriptMalware
PureLocker the Multi-OS Ransomware Targeting ServersLatest News
PureLocker the Multi-OS Ransomware Targeting Servers

Researchers have discovered ransomware encoded in PureBasic, hence its name PureLocker. It is able to encrypt files on Windows, Linux, and Mac OS X and targets [...]

VirusBotnetNetworkPureLockerRansomWareCyber-Attack