Attacks

Durex India customers may have leaked online

Durex India customers may have leaked online

Durex India, a well-known brand for condoms and personal lubricants, has accidentally exposed sensitive information of its customers through its official website. TechCrunch was the first one to report about this breach, which has raised serious concerns about privacy and security, especially considering the intimate nature of the products involved.

Telegram Zero-Day Vulnerability

Telegram Zero-Day Vulnerability

Telegram has patched a zero-day flaw in its Android application that allows attackers to hide malicious payloads in video files. Learn more about the flaw and how it affects Telegram users

Centre shuts 379 illegal loan websites, 91 phishing sites

Centre shuts 379 illegal loan websites, 91 phishing sites

The Indian Cyber Crime Coordination Centre (I4C) shut down 379 illegal loan websites and removed 91 phishing sites between October 2023 and March 2024. I4C also made 310 malicious '.in' domains non-functional and introduced a 'Report Suspect' feature to combat cyber fraud

CrowdStrike says over 97% of Windows sensors back online

CrowdStrike says over 97% of Windows sensors back online

More than 97% of Windows sensors were online as of Wednesday evening, CrowdStrike said in an update posted on its website. The systems are nearly fully restored after the company's July 19 software update crashed millions of Windows-based devices and froze corporate networks

Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to target people with financial sextortion scams."These included a smaller coordinated network of around 2,500 accounts that we were able to link to a group of around 20 individuals," the company said. "They targeted primarily adult men in the U.S. and used fake accounts

Canara Bank's official social media HAcked

Canara Bank's official social media HAcked

Canara Bank's official social media handle on X (formerly Twitter) has been hacked. The hacker changed the username of the handle to 'ether.fi'.  Currently, Canara Bank's official account (@canarabank) has 2.55 lakh followers. However, the bank has yet to take action in response.

Personal data of 7.5 million Boat customers data leaked on dark web

Personal data of 7.5 million Boat customers data leaked on dark web

Boat, one of India's leading wearables brands in India, has reportedly suffered a massive data breach. According to a report by Forbes India, personal data of more than 7.5 million customers has been leaked on the dark web. The report cites a hacker named ShopifyGUY, who claims to have leaked the data on dark web.

ShodanX

ShodanX

information gathering tool that harnesses the power of Shodan's extensive database. it offers multiple modes and flexible queries to extract valuable insights for security assessments, reconnaissance, and threat intelligence. With colorful output and intuitive commands, ShodanX empowers users to efficiently gather and analyze data from Shodan's facets, enhancing their cybersecurity efforts.

GoogleDorker - An next level of Google Dorking tool For Cybersecurity

GoogleDorker - An next level of Google Dorking tool For Cybersecurity

GoogleDorker is a command-line-based Google Dorking tool designed for bug hunters and penetration testers. It enables users to perform in-depth searches using Google Dorks to gather information about their targets. Utilizing Google's provided free APIs, GoogleDorker empowers cybersecurity professionals to conduct comprehensive reconnaissance and vulnerability assessment.

61 Pakistani Websites Hacked on Valentine's Day

61 Pakistani Websites Hacked on Valentine's Day

UCC Hackers Team Strikes: 61 Pakistani Websites Defaced on Valentine's DayThe targeted websites, spanning governmental agencies, educational institutions, and commercial enterprises, fell victim to the calculated maneuvers of the UCC Hackers Team

Install Honeypot on Linux With Demo

Install Honeypot on Linux With Demo

Honeypots are computer applications that collect information from hackers and other criminals. They can be used from a physical or a virtual location, and come in many forms. Honeypots use a wide range of techniques to trap malicious activity and are primarily used in the information security industry

How to Prevent Man In the Middle Attack?

How to Prevent Man In the Middle Attack?

In a web application, there are two actors usually: the client and the server. The third entity that remains unnoticed most of the time is the communication channel. This channel can be a wired connection or a wireless one. There can be one or more servers in the way forwarding your request to the destination server in the most efficient way possible.

What is Sniffing Attack in System Hacking?

What is Sniffing Attack in System Hacking?

A sniffing attack in system hacking is a form of denial-of-service attack which is carried out by sniffing or capturing packets on the network, and then either sending them repeatedly to a victim machine or replaying them back to the sender with modifications

USB Drop Attack in System Hacking

USB Drop Attack in System Hacking

The USB drop attack is a client-side attack in system hacking. This means that an attacker must be physically near the victim and plug a malicious USB device into the victim’s computer to launch this type of attack. This type of cybersecurity hack is often used by cybercriminals to steal data or install malware onto a vulnerable PC

Password Attack Threat?

Password Attack Threat?

The term “attack” is used here to denote performing a variety of hacks, including brute force and social engineering, that require access to the target’s computer system or network

Brute Force Attack

Brute Force Attack

A Brute force attack is a well known breaking technique, by certain records, brute force attacks represented five percent of affirmed security ruptures. A brute force attack includes ‘speculating’ username and passwords to increase unapproved access to a framework. Brute force is a straightforward attack strategy and has a high achievement rate.

Windows Hacking

Windows Hacking

Windows OS is a graphical user interface (GUI) operating system developed by Microsoft. It was first released in 1985 as an add-on for MS-DOS, which was the most popular version of MS-DOS at that time. In its early days, Windows OS was known as “Microsoft DOS” or “MS-DOS” and later on it became known as Windows 1.0 in 1987. The name changed to Windows NT when it was released in 1993 and then again