Home Tranning - Hacking

Tranning - Hacking

All the blog posts about education and stuff

Going Undercover With Invoke-Obfuscation | CQURE Academy

In this episode of Hacks Weekly, our cybersecurity expert Adrian demonstrates how hackers avoid penetration test detection by using the Invoke-Obfuscation tool to make their PowerShell commands look unreadable.Powershell is...

Instagram accounts hijacked following coordinated hack

If you’re an Instagrammer, you may want to take some basic precautions, such as picking a strong and unique password and signing up for two-factor authentication sooner rather than later Hundreds...

TLS 1.3 Released – Most Important Security Protocol on the Internet

An Internet’s most Important security protocol TLS 1.3 released with various improvement to perform a secure communication for online commerce, medicine, and other sensitive transactions TLS allows client/server applications to communicate over...

FBI Warns of Massive ATM Hack Threat Across the World To Withdraw Million From...

FBI Warns of Potential Massive ATM Hack Across the World, the cybercriminal is planning to launch a massive ATM cash-out to withdraw millions of dollars from the customer’s bank accounts. Cybercriminals...

Oracle Released Security Updates Addressing Critical Database Vulnerability

Oracle released security updates covering Database vulnerability that affects multiple versions on Windows, Linux, and Unix. The vulnerability can be tracked as CVE-2018-3110 and has CVSS v3 base score of 9.9....

Hackers Stolen Around Rs 94 Crore

Hackers compromised the Cosmos Bank server and allegedly transferred over Rs 94 crore between August 11 and August 13. The Cosmos Bank is the oldest and second largest bank in...

Google Tracks iPhone and Android Users Location Data Even Turned Off

Google tracks your location even if you have the Location History turned off on your mobile devices. Generally, Google asks permission to allow access to your location and if you...

Btlejacking Attack Could Allow an Attacker to Takeover the Bluetooth Connection

The Btlejacking Attack allows taking control over any Bluetooth Low Energy device, the attack abuses supervision timeout between two connected devices. The supervision timeout defines the time after which the...

macOS Invisible Mouse Clicks Attack Allows to Bypass Kernel Protection

A Presentation that was demonstrated during the Def Con 2018 regarding the Zero-day vulnerability that discovered in macOS High Sierra OS allows let an attacker access the kernel using invisible mouse clicks. Basically,...

Threat Report – Ransomware Returns, Growth in social engineering

According to Proofpoint Q2 Threat Report, the malicious message volume increased by 36% in the second quarter of 2018 and the ransomware returns back with new versions of GandCrab, Sigma, and...

APLICATIONS

ESET’s Mark James on addressing business security employee issues

ESET’s Mark James on the issues employees have with business security measures, and how to counter the difficulties without compromising safety. For those who...

HOT NEWS