[PoC] WinRAR Vulnerability Actively Exploited by Hackers

Do you use WinRAR on your windows? Have you updated it to the latest version? You are advised to update WinRAR to latest version 5.70 beta 1, as the WinRAR development...

What are the different types of XSS?

Cross-site scripting (XSS) is a common vulnerability that is carried out when an attacker injects malicious JavaScript into a website, which then targets the website’s visitors. By doing so, the...

The fourth horseman: CVE-2019-0797 vulnerability

The new zero-day in the Windows OS exploited in targeted attacks In February 2019, our Automatic Exploit Prevention (AEP) systems detected an attempt to exploit...

WhatsApp Co-founder Tells Students To Delete Facebook

As we realize that the WhatsApp, the texting application that is presently owned by Facebook is a standout amongst the most utilized...

New Mirai Malware Targeting Enterprise Wireless Presentation Systems

Mirai malware is a powerful strain that compromises a number of Linux devices and uses those devices to launch a massive distributed denial of service attacks. The new malware variant targets...

Vulnerability in Facial Recognition of Samsung S10 Variants

Experts have demonstrated that facial recognition in modern devices is unsecured and can be circumvented through simple tricks such as displaying an image or a video before a device. Samsung’s newest...

26 Million Stolen Records on Dark Web Sale by a Notorious Hacker

Posted on March 18, 2019 at 2:13 PM 26.42 million Company records stolen by a hacker last month has surfaced on the dark web for sale by the culprit. A notorious hacker who...

How to know if you have been blocked on WhatsApp ?

This shouldn’t come as an amazing, yet among every one of the features that texting application WhatsApp brings to the table, one...

iKeyMonitor: Best Android Keylogger App in 2019

iKeyMonitor is a professional Android keylogger...

What are the different types of XSS?

Cross-site scripting (XSS) is a common vulnerability that is carried out when an attacker injects malicious JavaScript into a website, which then targets the website’s visitors. By doing so, the...

APLICATIONS

HOT NEWS