FireEye released Commando VM, a Windows-based security distribution designed for penetration testers that intend to use the Microsoft OS. FireEye released Commando VM, the Windows-based security distribution designed for penetration testing and red teaming. FireEye today released an automated installer

Osmedeus is a fully automated tool that allows you to run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. How to use If you have no idea what are you doing just type the command

Single Sign-on is a method of authentication process that helps to log in multiple application using single login credentials. Security is enhanced through Single Sign-on (SSO) in light of the fact that users are diminished of the various secret password

Cyber Criminals launching a new malware via weaponized PDF & MS Word Version of New Zealand terror suspect’s manifesto. Researchers noticed 8chan, an imageboard website composed of user-created boards contains several posts that link to a manifesto, allegedly authored by

Bithumb Hacked 3rd time, Yes, One of the worlds largest cryptocurrency exchange Bithumb Hacked by unknown cybercriminals and stolen nearly $20 million worth cryptocurrencies from its wallet. Bithumb is a South Korean cryptocurrency exchange allegedly facing continuous cyber attacks since

Toyota hacked, yes, Toyota major subsidiaries network compromised by unknown hackers and they gained unauthorized access to the network where Toyota stored nearly 3.1 million customers sensitive information. Toyota Motor Corporation is a Japan-based, world’s second-largest automotive manufacturer who produces

You may be a victim for ShadowHammer hack, here is the complete list of the MAC Address, tool to check for infection and the update to resolve the issues. Operation ShadowHammer targeted the ASUS computers software update tool to inject

The 20-year-old security researcher James Lee publicly disclosed details and proof-of-concept exploits for two zero-day vulnerabilities in Microsoft web browsers. The expert opted to disclose the flaw after the tech giant allegedly failed to address the zero-day issues privately he

Hackers continue to employ new techniques to evade detection from antivirus and other security products. This time they started using previously reported and widely used BOM technique. Previously Russian hacker groups used this technique to modify the hosts file on

Gustuff a fully automated baking malware that abuses the accessibility Service to steal login credentials from 100+ global bank accounts and robs users of 32 cryptocurrency apps. The Accessibility Services in Android devices is to assist users with disabilities in

John the Ripper is a fast password cracker which is intended to be both elements rich and quick. It combines a few breaking modes in one program and is completely configurable for your specific needs for Offline Password Cracking. Out

Relentless espionage Group also called as aka APT33 (Elfin) targeting various organization in Saudi Arabia and United States by deploying a variety of malware in their network. Aka APT33 group specifically targeting corporate networks and it compromised around 50 organizations

Canadian Internet Registration Authority (CIRA) car packing system hacked and infected with ransomware that allows everyone to have a free park. CIRA is an Internet domain registration authority that manages more than 2.8 million .ca domain, the Internetcountrycodetop-level domain (ccTLD)

Most IT security professionals believe governments that mandate end-to-end encryption backdoors are exposed to a greater risk of nation state cyber-attacks, according to Venafi. The security vendor polled over 500 industry professionals at the recent RSA Conference in San Francisco

Though backup is a known best-practice approach to IT risk management, many companies are overwhelmed by the number of sites that need to be backed up, according to a new survey released today by Barracuda Networks. The study, Closing Backup

Shodan IoT search engine announced the launch of a new service called Shodan Monitor designed to help organizations to maintain track of systems connected to the Internet. Shodan, the popular IoT search engine, announced this week the launch of a