Sign in to your account or register new one to have full control over your orders, receive bonuses and more.
New User? Register
Some recent studies estimate that between 100 to 150 million computers worldwide would be directly infected by at least one malware such as Trojan or Keylogger.
A hacker, known as Phineas Fisher, has published more than 2TB of data from the Cayman National Bank. This includes more than 640,000 emails and the data of [...]
The Pipka script, recently discovered by researchers at Visa is capable of self-destructing after executing its code on a website, making it very difficult to [...]
Researchers have discovered ransomware encoded in PureBasic, hence its name PureLocker. It is able to encrypt files on Windows, Linux, and Mac OS X and targets [...]
Hacking Tools are programs and scripts that help hackers and security researchers find and exploit weaknesses in computer systems, web applications, servers [...]
After Spectre and Meltdown, another vulnerability affects Intel processors. A variant of the Zombieland attack would target chips under micro-architecture [...]
One of the difficult part of writing and reading content about hacking and Cyber-Security is that it's a world full of jargon and technical terms.
In networking, a ping sweep is a network scanning method that can establish a range of IPs which map to live hosts. The most used tool to run a ping sweeps is [...]
Appearing on a growing number of networks during May 2019, MegaCortex ransomware seems to have evolved. It can now change the password of the current user [...]
Recently one Cyber-Security researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.
The Nemty ransomware, initially detected in August 2019, has increased its reach by partnering up with the Trik botnet, which now delivers Nemty to compromised [...]
The French Center for Combating Digital Crime, with the help of Avast Researchers, was able to dismantle a vast botnet of 850,000 machines during a large-scale [...]