Posts

Showing posts from October, 2018

Canadian Crypto Exchange MapleChange Got Hacked – People Suspect An Exit Scam

Moscow court issued an arrest warrant for the co-founder of hacker group "Humpty Dumpty"

Telegram's 'secret chat' feature stores conversations in plain text

Bank Islami Cyber Attack Marks The Biggest In History for Pakistan

Latest Hacking News Podcast #153

Windows 10 Bug Allowed UWP Apps Full Access to User's Files

ch4inrulz: 1.0.1 | Vulnhub Hacking Challenge Walkthrough

Numerous Gabon Government Websites Hacked By Anonymous Hackers Group

Microsoft shared details of Indian bank customers’ with US intelligence agencies

Recon-ng – Open Source Intelligence (OSINT) Reconnaissance Framework

The Ultimate Plumber- A Tool For Writing Linux Pipes in A Terminal-Based UI

EaseUS Data Recovery Wizard Review

Sn1per- Automated Pentest Framework For Offensive Security Experts

Latest Hacking News Podcast #152

The Much Awaited MacOS’ Adroid File Transfer’s Bug Will Be Fixed At Last

The Crucial Roles of AI and Data Center Colocation in IT Security by Ben Ferguson

This Tor Enabled Sim Card Will Keep Your Communication Anonymous

Trump’s tapped phone may be the largest White House breach ever: former official

Jarbas: 1 Vulnhub CTF Challenge Walkthrough

Serious Vulnerability Discovered In X.Org Server Affects Major Linux and BSD Variants

Latest Hacking News Podcast #151

Apple Blocks GrayKey Passcode Cracking Tech With The Latest iOS 12 Update

Vulnerability In Microsoft Word Online Video Feature Allows for Phishing

Consulting Firm Leaked Data Of Democratic Party Fundraisers In Unsecured NAS Device

British Airways Hack Update: 185,000 More Customers Found Affected

Cisco Patched Privilege Escalation Vulnerability In Webex Meetings Desktop App

‘A cyber-attack could stop the country’

How This Secret Cyber Security Centre In Chennai Protects All Of Us In India From Cyber Attacks

Cyberry: 1 Vulnhub Hacking Challenge Walkthrough

Facebook Fine Of £500,000 Confirmed By UK ICO Over Cambridge Analytica

Exposed Docker Apis Used By Attackers In Creation Of New Containers That Perform Cryptojacking

Microsoft’s Digital Crime Unit busy catching cyber thugs in India

How To Prevent Your Business Becoming Collateral Damage Of Geopolitical Cyber Conflict