The Pirate Bay (TPB) malware: A hotspot for downloading a new spyware Trojan
For adware programs and tools, PirateMatryoshka is described as a "Russian doll." The Pirate Bay (TPB) has become a hotspot for downloading a new...
Researchers have found a Database with Zoom Credentials on Dark Web
Researchers find a set of Zoom video conferencing credentials that include meeting IDs, names, and host keys from only one email and password. A...
New Premium Tool for Mobile Hacking Firm Cellebrite can Hack & Extract Data from...
Israel's forensic firm and well-known law enforcement agent, Cellebrite published a public statement that iOS and high-end Android devices can be hacked to law...
SpeakUp – New Linux backdoor Trojan Discovered by Security Experts
SpeakUp Trojan backdoor can run on six different Linux and macOS distributions.
The hackers have developed a new Trojan backdoor which can run on Linux...
Account Hijacking Forum OGusers Hacked
OGusers is a popular forum for cybercriminals who are involved in different hacking operations, including the hijacking of online accounts, SIM swapping, Instagram stolen...
Spoof Blockchain.com fraudsters to steal Cryptocurrency $27 million
The law enforcement agencies in Europe have arrested a group of 6 persons by creating a website that impersonates Blockchain.com for emptying cryptocurrency wallets...
Hackers Use Google Cloud Computing Platform to deliver target malware attacks via PDF
Hackers have launched a worldwide malware campaign using the Google cloud computing platform via armed PDF.
Security researchers at the Netskope Threat Research Labs have...
Bug Bounty Training for Beginners: How to Become a Bug Bounty Hunter
Are you looking for the best tools to become a bug bounty hunter? We searched high and low to bring you the ultimate guide...
GandCrab Ransomware Free Decryption Tool released by Bitdefender Recover Files without paying (2019)
Recent decryption update allows victims infected with GandCrab to recover files from November 2018 to February 2019 without paying the ransom demand.
The Bitdefender team...
GPRS Tunnelling Protocol Expose 4G and 5G Cellular Networks To Attacks
Vulnerabilities in the GPRS Tunneling Protocol (GTP) expose 4G and 5G cellular networks to a range of attacks, including denial of service, user impersonation...