Menu

Blog

Trusted source of Cyber-Security and Ethical Hacking
Top 20 Most Used Hacking and Pentesting ToolsUnclassifiable
Top 20 Most Used Hacking and Pentesting Tools

Hacking Tools are programs and scripts that help hackers and security researchers find and exploit weaknesses in computer systems, web applications, servers [...]

NmapMetasploitBurpsuiteWiresharkAircrackTORHashcat
A variant of Zombieload flaw hits Intel's Newest Cascade Lake ChipsLatest News
A variant of Zombieload flaw hits Intel's Newest Cascade Lake Chips

After Spectre and Meltdown, another vulnerability affects Intel processors. A variant of the Zombieland attack would target chips under micro-architecture [...]

ZombieloadSpectreMeltdownVulnerabilityFlawAttackXeon
Top 50 Hacking Terms Used in Cyber-SecurityUnclassifiable
Top 50 Hacking Terms Used in Cyber-Security

One of the difficult part of writing and reading content about hacking and Cyber-Security is that it's a world full of jargon and technical terms.

CompilerDDoSDoxingKeyloggerRootkitZeroDay
How to use Ping Sweep to scan Networks and find Live HostsNetworking
How to use Ping Sweep to scan Networks and find Live Hosts

In networking, a ping sweep is a network scanning method that can establish a range of IPs which map to live hosts. The most used tool to run a ping sweeps is [...]

NetworkScanningPingFpingGpingReconnaissance
MegaCortex Ransomware is now able to change Windows PasswordLatest News
MegaCortex Ransomware is now able to change Windows Password

Appearing on a growing number of networks during May 2019, MegaCortex ransomware seems to have evolved. It can now change the password of the current user [...]

MegaCortexCyber-AttackRansomWareVirusNetwork
The Bluekeep Exploit is back and is used to install CryptominerLatest News
The Bluekeep Exploit is back and is used to install Cryptominer

Recently one Cyber-Security researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.

BlueKeepRDPCryptominerXMRMoneroWindowsVulnerability
Nemty Ransomware Expands Its Reach and Delivering MethodLatest News
Nemty Ransomware Expands Its Reach and Delivering Method

The Nemty ransomware, initially detected in August 2019, has increased its reach by partnering up with the Trik botnet, which now delivers Nemty to compromised [...]

NemtyTrikBotnetWortrikUSBSkypeSMBRansomWare
French Police Removed RETADUP Malware from 850,000 PCsLatest News
French Police Removed RETADUP Malware from 850,000 PCs

The French Center for Combating Digital Crime, with the help of Avast Researchers, was able to dismantle a vast botnet of 850,000 machines during a large-scale [...]

CryptominerMalwareMoneroRetadumpWorm
NSA Exploits used by Worm-Cryptominer to Attack SystemsLatest News
NSA Exploits used by Worm-Cryptominer to Attack Systems

Cyber-security researchers have discovered and analyzed a worm-cryptominer combo that uses a series of exploits to move sideways and compromise the devices of [...]

CryptominerEternalBlueExploitNSAPowershellPythonWorm
Google also stalking you on porn sites (Even in private browsing)Latest News
Google also stalking you on porn sites (Even in private browsing)

A study shows that Google use thousands of “trackers” on pornographic sites. In theory, the information collected is anonymous, but most platforms are very [...]

ExoclickFacebookGoogleJuicyAdsOraclePornWebxRay
Top 10 World's Most Notorious and Famous HackersUnclassifiable
Top 10 World's Most Notorious and Famous Hackers

Not all hackers are bad. There are good hackers called "white-hat" which use them skills to improve system security or either computer antivirus software [...]

WhiteHatGreyHatBlackHatHackersInfoSecHacking
How to use WebXray to Identify Domains collecting User DataInformation Gathering
How to use WebXray to Identify Domains collecting User Data

Do you know that while you are browsing a website, you are mostly tracked by third parties who compile detailed records of your browsing behaviors.

DataleakGDPRPrivacyPythonSelenium