The Donot Team threat actor has updated its Jaca Windows malware toolkit with improved capabilities, including a revamped stealer module designed to plunder information from Google Chrome and Mozilla Firefox browsers. read more
Industrial Cyber Security. Digital Marketing Techniques & Cybersecurity , YouTube tips and tricks
Sunday 21 August 2022
Friday 19 August 2022
Hackers Opting New Attack Methods After Microsoft Blocked Macros by Default
Thursday 18 August 2022
Cybercriminals Developing BugDrop Malware to Bypass Android Security Features
In a sign that malicious actors continue to find ways to work around Google Play Store security protections, researchers have spotted a previously undocumented Android dropper trojan that's currently in development.
"This new malware tries to abuse devices using a novel technique, not seen before in Android malware, to spread the extremely dangerous Xenomorph banking trojan, allowing criminals to perform On-Device Fraud on victim's devices," ThreatFabric's Han Sahin said in a statement. Dubbed BugDrop by the Dutch security firm, the dropper app is explicitly designed to defeat new features introduced in the upcoming version of Android that aim to make it difficult for malware to request Accessibility Services privileges from victims. read moreWednesday 17 August 2022
Findmyhash
Written in Python, findmyhash is a free open-source tool that helps to crack passwords using free online services.
It works with the following algorithms: read moreMonday 15 August 2022
Friday 12 August 2022
Kismet Wireless
Kismet Wireless is a multi-platform free Wireless LAN analyzer, sniffer, and IDS (intrusion detection system). read more
Saturday 6 August 2022
Sqlmap
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches lasting from database fingerprinting to data fetching from the database to accessing the underlying file system and executing commands on the operating system via out-of-band connections.read more
Google Launches GUAC Open Source Project to Secure Software Supply Chain
Google on Thursday announced that it's seeking contributors to a new open-source initiative called Graph for Understanding Artifact Comp...
-
What is a Script Kiddie? A script kiddie, or skid, is a term that describes a young hacker who has much to learn yet acts as if he or she ...
-
Cryptolocker Virus Definition Cryptolocker is a malware threat that gained notoriety over the last few years. It is a Trojan horse that infe...
-
What is hacktivism? Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individ...