Firebase Vulnerability Leaks 100 Million Records from 3,000 Mobile Apps

Newly discovered highly critical Firebase Vulnerability named as HospitalGown affected over 2,300 unsecured Firebase Databases & 3,000 iOS and Android Apps which exposed around 100 million records. Firebase Vulnerability affected Android apps...

Modern OSs for embedded systems

At Kaspersky Lab we analyze the technologies available on cybersecurity market and this time we decided to look at what OS developers are offering for embedded systems (or, in other...

How to perform Information Gathering in Kali using NMAP

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as...

Bithump hacked – Hackers Steal $31 Million Worth Cryptocurrency

Bithump hacked second time in this year, hackers stolen 35 billion won which is equivalent to $31 million from the exchange platform. It lasts from last night to today morning in...

16 Person Hacker Group Arrested for Mining Cryptocurrency

Police arrested 16 person hacker group for illegally mining cryptocurrency at Internet cafes. The hacker group compromised thousands of system in more than 30 cities across the country and earned...

How To Hack Android Phone Using Another Android Phone Remotely 2018

Airdroid Airdroid  is basically used for transferring files over distances and sharing of resources can be easily done with Airdroid, also you can also have remote access to other devices ....

New Version of SamSam Ransomware Attack Specifically Targeted Victims

A new version of the SamSam Ransomware Attack targeting the specific victims that selected by the Malware author and it contains a variety of unique future unlike other ransomware and it...

Olympic Destroyer is still alive

In March 2018 we published our research on Olympic Destroyer, an advanced threat actor that hit organizers, suppliers and partners of the Winter Olympic Games 2018 held in Pyeongchang, South...

Intrusion-Detection-System (IDS) And Its Detailed Working Functions

Intrusion detection system (IDS) gathers and analyzes information from within a computer or network to identify unauthorized access, misuse, and possible violations. IDS also can be referred as a packet sniffer which intercepts...

Ex-CIA Employee Charged for Leaking CIA Hacking Tools to WiKiLeaks

Joshua Adam Schulte, an Ex-CIA Contractor charged in major CIA hacking Tools leak to Wikileaks that was developed by CIA to spy foreign adversaries. Joshua Worked for CIA where he assigned...

LATEST NEWS

MUST READ