LATEST ARTICLES

Unpatched Spoofing Flaw in UC Browser Exposes 600M Users to Phishing

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The vulnerability was discovered by the security...

Team Spotlight: User Operations

Since 2011, the Blockchain team has been creating products that empower people to store and use cryptocurrencies to make an impact across the world. It’s our bread and butter. The...

ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group

ESET researchers discovered a backdoor linked to malware used by the Stealth Falcon group, an operator of targeted spyware attacks against journalists, activists and dissidents in the Middle East Stealth...

Whatsapp Privacy Flaw – Delete for Everyone Fails to Delete Media

WhatsApp introduced ‘delete for everyone’ feature last year. this is a quite life-saving feature which let you recall the message that you sent accidentally. Security Consultant Shitesh Sachan, noted that the...

CryptoCurrency Breaches and Hacking Scandals: How to Address them?

The proponents of cryptocurrency always harp on the point that it is very safe and secure and the blockchain technology that is used is virtually hacking proof. Let’s face it,...

How to Get a Finger on the Pulse of Corporate Networks via the SSL...

Detectify Crowdsource hacker, Alyssa Herrera, is a full-time bug bounty hacker and web application security researcher who works to protect organizations.  She was one of several Crowdsource hackers to submit...

HiddenWall – Create Hidden Kernel Modules

HiddenWall is a Linux kernel module generator used to create hidden kernel modules to protect your server from attackers. It supports custom rules with netfilter (block ports, hidden mode, rootkit...

Cybercrime seen to be getting worse: The time to act is now

What mounting public concern about falling victim to cybercrime says about government and corporate efforts at cybercrime deterrence Is the risk of becoming a victim of cybercrime increasing? Most people in...

Ad Inserter Plugin Let Hackers to Execute Arbitrary PHP Code

A critical remote code execution vulnerability in WordPress plugin Ad Inserter, let hackers execute arbitrary PHP code in the vulnerable installations. The vulnerability was discovered by Wordfence security team and the...

Unpatched Spoofing Flaw in UC Browser Exposes 600M Users to Phishing

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The vulnerability was discovered by the security...