Sunday, May 19, 2024

Yearly Archives: 2022

WannaRace

The WebApp Was Designed To Be Vulnerable To Race Conditions For The Purpose Of Practicing Race Conditions. In the built WebApp, race condition vulnerability can...

Hackers Use Cloud Services to Distribute Nanocore, Netwire, and AsyncRAT Malware

Threat actors are using Amazon and Microsoft's public cloud services into their harmful campaigns to deliver commodity remote access trojans (RATs) like Nanocore, Netwire,...

SMEs Still An Easy Target For Cybercriminals

According to a Markel Direct poll, cybercrime continues to be a big worry, with 51 percent of SMEs experiencing a cybersecurity incident. Markel Direct surveyed...

NoReboot – Faking iPhone Shutdown and Reboot

A novel proof-of-concept vulnerability has been disclosed that imitates an iPhone reboot or shutdown to avoid virus removal. It's called NoReboot, and it also...

FBI Warns about Google Voice Authentication Scams

  The FBI is warning consumers who post their phone numbers publicly about a new Google Voice authentication scam. The Overview Americans who reveal their phone number...

A New Approach to Detect Stealthy Malware on IoT Devices

Security researchers have developed a new method for detecting evasive malware on IoT devices that employs electromagnetic field emanations. Even in obfuscation situations, the...

New SysJoker backdoor targets Windows, macOS, and Linux

SysJoker, a new multi-platform backdoor malware that targets Windows, Linux, and macOS and can elude detection on all three operating systems, has been discovered...

KILLSHOT:– A Penetration Testing Framework, Information gathering tool & Website #vulnerability

With this tool user can spider their website and get important information and gather information automatically using whatweb-host-traceroute-dig-fierce-wafw00f or identify the CMS and find...

Windows Exploit Suggester:– Next Generation (WES-NG)

WES-NG is a tool based on the output of Windows' systeminfo utility, which lists the vulnerabilities to which the OS is vulnerable, as well...

Researchers Find Bugs in Over A Dozen Widely Used URL Parser Libraries

Inconsistencies and ambiguities have been discovered in 16 distinct Uniform Resource Locator (URL) parsing libraries, which might be exploited to evade validations and open...

Most Read

Write For Us