Search
Monday 23 October 2017
  • :
  • :

Archives post

Website Attacks Surge: Report

Websites Hit by 63 Attacks Per Day, Says SiteLock The number of attacks aimed at websites has increased considerably in the past months,...

Trity – advanced pentesting framework vulnerability testing to cryptography

Trity Trity is an advanced pentesting framework dedicated to everything from vulnerability testing to cryptography. Installation &...

Install Metasploit Framework on any Android devices

Install Metasploit Framework on any Android devices Requirement: Termux Android 5.0 or later Internet connection How to Open Termux, type...

pentest-machine: Automates some pentest jobs via nmap xml file

pentest-machine Automates some pentesting work via a nmap XML file. As soon as each command finishes it writes its output to the terminal...

burplay: Burp Extension for Detection Privilege Escalations

burplay Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is...

Data Stealer Malware Hits Critical Cyber Infrastructure in US and S.Korea

IT security researchers at FireEye have discovered a malware that aims to steal sensitive information from critical cyber infrastructure...

World’s largest child porn site was run by police for undercover op

Dark web is home to explicit and illegal content including child pornography sites which are often in the news once they get busted. But...

Hackers are compromising websites to mine cryptocoins via user’s CPU

For the last couple of weeks, the trend of inserting code in websites that generate cryptocurrency has been growing like never before. What...

Qatar has blocked Skype, WhatsApp, Viber, Duo, and Facetime

The Qatar administration also told internet users that they would be reviewing the issue though no decision or official comment on the...

4G/5G Wireless Networks as Vulnerable as WiFi and putting SmartCities at Risk

Researchers from security firm Positive Technologies warns of 4G/5G Wireless Networks as vulnerable as WiFi and putting smart-cities at...

FIN7 hacking group is switched to new techniques to evade detection

The financially-motivated FIN7 APT group (also known as Carbanak or Anunak) recently changed attack technique again to evade...

A man who goes by the nickname LiquidWorm released a FLIR Thermal Camera Exploit

On September 25, 2017, a man which goes by the nickname ‘LiquidWorm’ has released the exploit code for FLIR Thermal Cameras. On...

North Korea hackers threaten Irish companies with ‘almost daily’ attacks

State-sponsored hackers from North Korea are launching almost daily attacks on Irish companies and critical infrastructure North Korean...

KovCoreG group spreading Kovter Malware via fake browser and Flash updates

Security experts from Proofpoint have uncovered a malvertising actor named KovCoreG group that is spreading the Kovter malware via fake...

PureVPN Σύλληψη από log files που δεν υπάρχουν!

Η PureVPN, είναι μια εταιρεία πάροχος εικονικών ιδιωτικών δικτύων που...

Lab Setup for VOIP Penetration Testing

Hello friends! Today you will learn how to setup VOIP in virtual machine using tribox 2.8.0.4 iso image for making phone calls and sending...