Home Tranning - Hacking

Tranning - Hacking

All the blog posts about education and stuff

Most Advanced Backdoor Obfuscation and Evasion Technique

Cybercriminals are using the most sophisticated techniques to bypass the security controls in a various organization such as  IT, medical, manufacturing industries, energy sectors, even government entities. Sometimes developers are creating...

Oracle Patch Update to Address 334 Vulnerabilities Across All the Products

Oracle Releases Critical Patch Updates that contains security fixes for 334 products across all the families. The Oracle Patch Update covers products including Oracle Database Server, Oracle Global Lifecycle Management, Oracle...

Blackgear Cyberespionage Abuses Blogging and Social Media Services To Evade Detection

Blackgear Cyberespionage campaign is active at least from 2008, the threat actors behind the campaign use various malware tools such as the Protux and Elirks backdoor. Trend Micro Security researchers...

Administrator of The Infamous Silk Road Market Extradited To US To Face Charges

The US Attorney for the Southern District of New York announced the extradition of 30-year-old Irish Man Gary Davis who goes with the online handle “Libertas”. He was arrested in...

Investing in Fraud Detection Software

Businesses are constantly trying to find better ways to fight fraud but one question many are left asking is ‘is fraud detection software worth the expense?’. A tool to tackle...

Phishing Email Campaign – DanaBot Banking Trojan Steal Private Information

A new phishing email campaign targeting Australian customers with a fake standard MYOB-like HTML invoice template that contains FTP links pointed to compromised servers. With this new campaign, attackers used FTP...

Ammyy Admin compromised – Beware If You Downloaded Ammyy Admin

Attackers compromised the official website of Ammyy Admin and made to serve a malicious version of Ammyy Admin instead of the legitimate one and use FIFA World Cup trend to...

3 Ways to Protect Your Apps from Cyber Attacks

Are you an enterprise business that implements apps into the day-to-day operational processes? If so, have you ever considered the security risks involved with using these apps, and how a...

Russia APT28 hacking group Tracked Using a Variant X-Agent

Security researchers from Z-Lab at CSE Cybsec observed series of malware submitted to the online sandbox and a sample submitted to Virus Total that was attributed by some experts to...

Debian 9.5 Released With Fix for Spectre v2 and Other Security Issues

Debian 9.5 released with the fix for a number of security issues including Spectre and the update covers other Miscellaneous Bugfixes. The release is not completely a new version of Debian...

APLICATIONS

HOT NEWS