Cyber

Telegram Zero-Day Vulnerability

Telegram Zero-Day Vulnerability

Telegram has patched a zero-day flaw in its Android application that allows attackers to hide malicious payloads in video files. Learn more about the flaw and how it affects Telegram users

Centre shuts 379 illegal loan websites, 91 phishing sites

Centre shuts 379 illegal loan websites, 91 phishing sites

The Indian Cyber Crime Coordination Centre (I4C) shut down 379 illegal loan websites and removed 91 phishing sites between October 2023 and March 2024. I4C also made 310 malicious '.in' domains non-functional and introduced a 'Report Suspect' feature to combat cyber fraud

CrowdStrike says over 97% of Windows sensors back online

CrowdStrike says over 97% of Windows sensors back online

More than 97% of Windows sensors were online as of Wednesday evening, CrowdStrike said in an update posted on its website. The systems are nearly fully restored after the company's July 19 software update crashed millions of Windows-based devices and froze corporate networks

Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams

Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were found to target people with financial sextortion scams."These included a smaller coordinated network of around 2,500 accounts that we were able to link to a group of around 20 individuals," the company said. "They targeted primarily adult men in the U.S. and used fake accounts

8 Useful Firefox Extensions For Ethical Hacking and Security Research

8 Useful Firefox Extensions For Ethical Hacking and Security Research

When performing penetration testing of any web-based application, the Mozilla Firefox browser is the most favorable browser for almost every Ethical Hacker and Security Researcher. Mozilla Firefox has proved itself a more featured browser than various browsers like Chrome, Safari, Opera, etc. One of the main reasons behind its popularity is the More Tools features, including Web Developer Tools,

7 Ways To Earn Money as an Ethical Hacker

7 Ways To Earn Money as an Ethical Hacker

Ethical hacking, also known as “white hat” hacking, is the practice of using computer security skills for the purpose of testing and improving the security of a computer system or network. This type of hacking is conducted with the permission of the owner of the system or network, and the aim is to identify vulnerabilities and weaknesses that could be exploited by malicious hackers.

10 Best Cybersecurity Certifications (2024)

10 Best Cybersecurity Certifications (2024)

The demand for cybersecurity professionals has surged in recent years, driven by the increasing shift to online platforms across various industries. From online education to e-commerce and virtual events, the Internet has become integral to our daily lives. With this reliance comes the critical need to protect data, servers, and applications from cyber threats.

Evil Twin in Kali Linux

Evil Twin in Kali Linux

Evil Twin Attack is a Wi-Fi hacking technique that tricks the user into connecting to a spoofed targeted network, making it nearly impossible to determine whether the network is real or fake, resulting in the user entering their password in the fake network hosted by the Hacker.

Persistent Reverse Shell with Metasploit in Kali Linux

Persistent Reverse Shell with Metasploit in Kali Linux

A reverse shell is a type of network connection in which a command shell is executed on a remote machine, and the input and output of the shell are transmitted over the network back to the local machine. This allows a user on the local machine to execute commands on the remote machine and receive the output of those commands.

Personal data of 7.5 million Boat customers data leaked on dark web

Personal data of 7.5 million Boat customers data leaked on dark web

Boat, one of India's leading wearables brands in India, has reportedly suffered a massive data breach. According to a report by Forbes India, personal data of more than 7.5 million customers has been leaked on the dark web. The report cites a hacker named ShopifyGUY, who claims to have leaked the data on dark web.

ShodanX

ShodanX

information gathering tool that harnesses the power of Shodan's extensive database. it offers multiple modes and flexible queries to extract valuable insights for security assessments, reconnaissance, and threat intelligence. With colorful output and intuitive commands, ShodanX empowers users to efficiently gather and analyze data from Shodan's facets, enhancing their cybersecurity efforts.

61 Pakistani Websites Hacked on Valentine's Day

61 Pakistani Websites Hacked on Valentine's Day

UCC Hackers Team Strikes: 61 Pakistani Websites Defaced on Valentine's DayThe targeted websites, spanning governmental agencies, educational institutions, and commercial enterprises, fell victim to the calculated maneuvers of the UCC Hackers Team

Skills Required to Become a Ethical Hacker

Skills Required to Become a Ethical Hacker

Ethical Hacking is compromising computer systems for assessing security and acting in good faith by informing the vulnerable party. Ethical hacking is a key skill for many job roles related to securing the online assets of an organization.

Why Hackers Use Kali Linux?

Why Hackers Use Kali Linux?

New technologies are rapidly allowing us to transfer crucial data over the internet. Therefore, hacking has become so much more popular and common nowadays. Ethical hackers do white hat hacking to find and repair the vulnerabilities of the system, which increase the security of the systems. On the other side, black hat hacking is used for breaching the system and accessing the system with no pre

Install Honeypot on Linux With Demo

Install Honeypot on Linux With Demo

Honeypots are computer applications that collect information from hackers and other criminals. They can be used from a physical or a virtual location, and come in many forms. Honeypots use a wide range of techniques to trap malicious activity and are primarily used in the information security industry

How to Prevent Man In the Middle Attack?

How to Prevent Man In the Middle Attack?

In a web application, there are two actors usually: the client and the server. The third entity that remains unnoticed most of the time is the communication channel. This channel can be a wired connection or a wireless one. There can be one or more servers in the way forwarding your request to the destination server in the most efficient way possible.

USB Drop Attack in System Hacking

USB Drop Attack in System Hacking

The USB drop attack is a client-side attack in system hacking. This means that an attacker must be physically near the victim and plug a malicious USB device into the victim’s computer to launch this type of attack. This type of cybersecurity hack is often used by cybercriminals to steal data or install malware onto a vulnerable PC