Commando VM 2.0 – A new version of Offensive Pentesting VM

Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community and red teamers with updated hacking tools and new features such as Kali Linux, Docker...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

[BlackHat USA 2019] Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon...

After this year’s Black Hat Asia, it’s time for Paula to rock at the Black Hat USA in Las Vegas! On August 8th during The Black Hat USA 2019, Paula Januszkiewicz gave an extremely technical and...

How To Keep Your Mobile Safe From Cyber Security Threats

Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You can switch from monitoring work emails to playing the latest games, to live...

Ad Inserter Plugin Let Hackers to Execute Arbitrary PHP Code

A critical remote code execution vulnerability in WordPress plugin Ad Inserter, let hackers execute arbitrary PHP code in the vulnerable installations. The vulnerability was discovered by Wordfence security team and the...

Biometric Platform Data Breach Leaked Millions of Users Fingerprint Data

Security researchers discovered the biggest data breach in Biometric Security Platform BioStar 2 that leaks millions of users facial recognition records, fingerprints, log data, and other personal information. BioStar 2, a...

Apple bug bounty program – Rewards Up to $1 Million

Apple expands its bug bounty program to cover all operating systems that include macOS, watchOS, tvOS, iPadOS, and iCloud along with the iOS bug bounty program. The tech giant has confirmed...

Texas Ransomware Blitz: 23 Local Governments Affected

The state of Texas has come under fire from a coordinated ransomware attack affecting over 20 local authorities. The Texas Department of Information Resources (DIR) released an updated statement over the...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

5 Common Phishing Attacks and How to Avoid Them?Security Affairs

Phishing is one of the oldest methods of cyberattacks. It uses deceptive and manipulated emails as a tool for gathering personal and...

LATEST NEWS

MUST READ