Home Technology - Hacking

Technology - Hacking

Technology news and blogs

Hackers Drop Masad Stealer and Steal The Sensitive Data via Telegram

Researchers discovered a new trojan Masad Stealer to deliver the powerful spyware on the targeted systems and exfiltrate the stolen data via Telegram. Masad Stealer using Telegram as a command...

Hacking WhatsApp with GIF Image

A vulnerability in WhatsApp has been discovered that can be used to compromise user chat sessions, files, and messages in other words WhatsApp can be hacked by just sending a...

Ransomware attacks on hospitals will worsen if security doesn’t improve

Ransomware attacks on hospitals in Alabama forced a healthcare system to turn patients away last week. The data and systems at three hospitals were held hostage until an undisclosed amount...

Cybercriminals Attack at a Powerful Chinese Financial Company

Reading Time: 2 minutes  Incidents of user data theft skyrockets...

How Virtual Reality Can be the Future of Education

One of the major problems that students battle with is understanding very abstract parts of...

Managed Detection and Response analytics report

 Download full report (PDF) Introduction This report contains the results of the Managed Detection and Response (MDR) service (brand name – Kaspersky Managed Protection). The MDR service provides managed threat hunting and...

The 5 Best Note Taking Apps For Mac

Are you scouting for some of the best Note Taking apps for macOS? Don’t worry anymore as in this article we have listed some of the most feature-rich note-taking apps...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

9 Android Zero-day Vulnerabilities Affects Billions of Android Devices

Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller ID spoofing, unauthorized call operations, DOS attack, and...

APLICATIONS

HOT NEWS