AutoNessus: A Script To Communicate With Nessus API
AutoNessus: A Script To Communicate With Nessus APIAutoNessus is a script that communicates only with the Nessus API. The main goal is to help with automating scans. We can easily list all the scans,...
View ArticleApple Watch Comes Out In The Lead of Fitness Tracker Privacy And Security
Apple Watch Comes Out In The Lead of Fitness Tracker Privacy And SecurityAccording to the new study shows, if we talk about the privacy and security of user data, then the Apple Watch and its...
View ArticleHackers Are Using New Tactics To Steal Money From Your Bank Account
Hackers Are Using New Tactics To Steal Money From Your Bank AccountNowadays new tactics and techniques have been used by several cybercrime gangs that are common for Advance Persistent Threat (APT)...
View ArticleA Trojan To Easily Manipulate Ruble-Dollar Exchange Rate
A Trojan To Easily Manipulate Ruble-Dollar Exchange RateA new Trojan came which can easily manipulate the rubles-dollar exchange rate. In 2015, hackers have already made the use of this Trojan on most...
View ArticleJSPrime A Light-Weight Source Code Scanner
JSPrime:A Light-Weight Source Code ScannerIntroductionToday, many developers moved to JavaScript technology because of its simplicity, flexibility and as it is user-friendly. In recent days because of...
View ArticleAWS Scout-2: A Security Tool For Accessing AWS Environment (Security Posture)
Image Source:Â n0where.netAWS Scout-2: A Security Tool For Accessing AWS (Security Posture)Â AWS Scout2 is an open-source security tool by which assessing of AWS environments security posture becomes...
View ArticleAnonymous Hacks South African Government Employees Data Against Child Labor
Anonymous Hacks South African Government Employees Data Against Child Labor.The Hack as behalf of child labor in South Africa. But this breached only decided to leak the data of Government officials,...
View Article$38 Million Is Needed By FBI To Break The Encryption
$38 Million Is Needed By FBI To Break The Encryption"Whenever we encounter encryption during any of the investigation, that are the hard time for our agents, local as well as state cops too" announced...
View ArticleGoogle's New Security Feature Can Identify Dodgy E-mails
Google's New Security Feature Can Identify Dodgy E-mailsFor boosting security Google added a new feature in Gmail account page. This new feature helps people to identify dodgy emails. It also ensures...
View ArticleSwift.nV: A "Secret Keeper" Application For iOS
Swift.nV: A "Secret Keeper" Application For iOS.Swift.nV is a security training tool/application that instructs about how the vulnerabilities found and how we can prevent them. It is an iOS "secret...
View Article7 Most Sensible Android Tools That Keeps Your Phone Safe
Image Source: computerworld.com7 Most Sensible Android Tools That Keep Safe Your PhoneThere are many people uses Android phone in the world and most of them focus on the security tools like Lookout,...
View ArticleBlackEnergy Cyber-Attackers Attacked On Ukraine Railway And Mining Company
BlackEnergy Cyber-Attackers Attacked On Ukraine Railway And Mining CompanyIn December, those BlackEnergy cyber-attackers who had attacked the two power facilities in Ukraine, now recently they have...
View ArticleMimikatz C Learning Tool And Also To Do Experiments With Windows Security
Mimikatz C Learning ToolDefinition: For learning C language we used mimikatz. it is a tool by which we can easily learn C programming language and can also do experiments with Windows security.What can...
View ArticleApple's Being Sued Over A Security Feature That Can Break The iPhone
Apple's Being Sued Over A Security Feature That Can Break The iPhoneDue to the phone-bricking "Error 53" in iPhone, Apple has to face a class action lawsuit, which let some customers to buy the new...
View ArticleA 16-Year-Old Has Been Arrested By British Police For Cracking The Personal...
A 16-Year-Old Has Been Arrested By British Police For Cracking The Personal AccountsWASHINGTON: On Friday British Police had arrested the teenager, who was suspected of cracking the personal accounts...
View ArticleFingerping: A Security Tool For Fingerprint PNG Files Of Web Applications
Fingerping: A Security Tool For Fingerprint PNG Files Of Web ApplicationsWhen we audit web applications Fingerprinting is the most important step. The tool which is able to fingerprint the PNG files of...
View ArticleAdobe CC 3.5.0.206 Contains A Bug That Deletes Important Data Secretly
Image Source: petapixel.comAdobe Creative Cloud 3.5.0.206 Contains A Bug That Deletes Important Data SecretlyThe latest version of Creative Cloud that is Adobe Creative Cloud version 3.5.0.206. Adobe...
View ArticleTDL: A Tool To Bypass Windows x64 Driver Signature Enforcement
TDL (Turla Driver Loader) For Bypassing Windows x64 Signature EnforcementDefinition: TDL Driver loader allows bypassing Windows x64 Driver Signature Enforcement.What are the system requirements and...
View ArticleCTF-Tool: A Tool To Create An Installer Of Various Security Research Tools
CTF-Tool: A Tool To Create An Installer Of Various Security Research ToolsDefinition: CTF-tool (a collection of scripts) that can be easily used to create an install of various security research tools....
View ArticleCybercriminals Hacked An E-Commerce Platform To Steal Sensitive Information
Cybercriminals Hacked The Magneto Ecommerce Platform To Steal Sensitive InformationUsing a piece of malware, Cybercriminals hacked the Magneto e-commerce platform to steal sensitive, important and...
View Article