SynAck targeted ransomware uses the Doppelgänging technique

The Process Doppelgänging technique was first presented in December 2017 at the BlackHat conference. Since the presentation several threat actors have started using this sophisticated technique in an attempt to...

Now Any One Can Create Ransomware With No Coding Skills

A new Trojan Development Kits (TDKs) introduced by Chinese malware developers doesn’t require any coding skills to build your own Ransomware. You can generate Ransomware simply by filling the forms. Cyber...

Who’s who in the Zoo

ZooPark is a cyberespionage operation that has been focusing on Middle Eastern targets since at least June 2015. The threat actors behind the operation infect Android devices using several generations...

Exploit Pack V10.07 Released with More than 38.000+ Exploits

Exploit Pack is a well-integrated open source tool for conducting professional penetration tests. As like any other penetration testing tool it requires understanding and expertise. It contains over 38000+ exploits together...

Best Ways to Hack Facebook account Easily [2018]

One of the most trending topics in hacking world is How to Hack Facebook account. So today you will learn best... The post Best Ways to Hack Facebook account Easily appeared...

There’s No Such Thing as Free Wi-Fi

Have you connected your phone or laptop to a public Wi-Fi? This might be a free Wi-Fi hotspot at an airport, train station, shopping centre, hotel chain, or fast food franchise. If so,...

Back to The Future: ASUSTOR Web Exploitation

1.      Vulnerability Discovery, Exploitation and Disclosure 1.1  Introduction and Background Recently I have been using my free time to perform independent research, learning and bug...

Is Remote Desktop Connection Secure?

Using RDP Bitmap Caches I will open the next document, which is RDPEGDI document, and here we have a chapter within the document with the number 3.1.1.1.1, and within this chapter,...

DDoS attacks in Q1 2018

News overview In early January, it was reported that an amateur hacker had come close to pulling off a botnet attack using “improvised” materials. Armed with information gleaned from hacker forums,...

Energetic Bear/Crouching Yeti: attacks on servers

Energetic Bear/Crouching Yeti is a widely known APT group active since at least 2010. The group tends to attack different companies with a strong focus on the energy and industrial...

LATEST NEWS

MUST READ