Home General

General

Everything general about this

Roboto Botnet Exploiting Linux Webmin Server RCE Vulnerability

A new wave of Roboto Botnet activities being discovered that attack the Linux Webmin servers by exploiting the RCE vulnerability using vulnerability scanning and P2P control module. Roboto Botnet initially detected...

5 Best VPN Free Trial 2019

Which VPN Free Trial Is the Best? Every time you access the internet, whether through your home computer or while you’re sitting at a coffee shop with your phone or...

SOC Analyst All-In-One CLI Tool

Sooty is a tool developed with the task of aiding a SOC analyst to automate parts of their workflow and speed up their process. The main goal of Sooty is to...

FBI warns of romance scams using online daters as money mules

Up to 30 percent of romance fraud victims in 2018 are estimated to have been used as money mules Scammers are using dating sites and apps not only to scout for...

10 Ways To Prevent Email Phishing Attacks

No one wants to believe they’d fall victim to phishing attacks. However, phishing attacks are on the rise and are more sophisticated than ever. There’s a good reason phishing attacks...

US student was allegedly building a custom Gentoo Linux distro for ISIS –

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: Zdnet US authorities have arrested and charged a 20-year-old student from Chicago with providing material support...

SIM Card Browser Vulnerability let Hackers Control Mobile

The WIBattack vulnerability impacts hundreds of millions of telecom subscribers worldwide. The vulnerability comes from the sim card and it doesn’t depend on the mobile phone or the operating system. The...

Facebook bug turns on iPhone camera in the background

A recent update to Facebook’s iOS app introduced a bug that had some users worried Earlier in November, several iPhone users started experiencing a mysterious glitch while using the Facebook app....

What does it take to attract top cybersecurity talent?

From professional backgrounds to competitive salaries – a study delves into what it takes to build strong cybersecurity teams Cybersecurity professionals are in high demand, but in low supply, the 2019...

5 Best VPN Free Trial 2019

Which VPN Free Trial Is the Best? Every time you access the internet, whether through your home computer or while you’re sitting at a coffee shop with your phone or...

APLICATIONS

Unpatched Spoofing Flaw in UC Browser Exposes 600M Users to Phishing

An URL bar address spoofing vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing...

HOT NEWS