Skip to content
Click Here
TOP 7 Techniques to Steal NFT
Secondary Navigation Menu
Menu
  • Home
  • Cyber Security
  • Mobile Security
  • Technology
  • Vulnerabilities
  • Forensics
  • Data Breach
  • Virus
  • Tutorials
  • Facebook
  • Twitter
  • YouTube
  • Telegram

Cyber Security News | Exploit One | Hacking News

5 million new malware variants detected throughout 2019

2020-02-06
On: February 6, 2020
In: Technology
Tagged: banking Trojan, cybersecurity, EMOTET, GandCrab, Hacking, malware, ransomware, Remote Access Trojans (RATs)

As tech and security companies move forward in protecting their users against malware, cybercriminal groups also manage to develop new malware variants, which appear with a frightening frequency, as mentionedRead More →

Critical TeamViewer credential storage vulnerability; billions of devices affected

2020-02-05
On: February 5, 2020
In: Vulnerabilities
Tagged: cybersecurity, Hacking, TeamViewer, vulnerability

According to an information security report, TeamViewer, the popular remote access tool, presents a serious vulnerability in the way its users’ access credentials are stored. Exploiting these flaws would allowRead More →

MIT develops device to amplify the range of any WiFi network by 1000%

2020-02-05
On: February 5, 2020
In: Technology
Tagged: 5G networks, cybersecurity, Hacking, mobile telephone, telecommunications, WiFi

Although some cities around the world already have the technological infrastructure needed for the use of the 5G network, researchers and network security experts still have many obstacles that preventRead More →

Critical vulnerability in IBM WebSphere Application Server

2020-01-31
On: January 31, 2020
In: Vulnerabilities
Tagged: cybersecurity, Denial of Service (DoS) attack, Hacking, IBM, network security, vulnerability

Vulnerability reporting is an essential part of a collaborative environment in the cybersecurity community. This work often facilitates the work of computer security firms, which are sometimes overrun by theRead More →

How coronavirus is spreading from human beings to our devices

2020-01-31
On: January 31, 2020
In: Cyber Security
Tagged: China, coronavirus, cybersecurity, Hacking, Japan., malicious emails, malware

It has become common that cybercriminals try to take advantage of relevant facts and globally relevant issues to deploy malicious campaigns that are attractive to unsuspecting users. This time, anRead More →

SpiceJet airline was hacked; personal data of millions of customers leaked

2020-01-30
On: January 30, 2020
In: Cyber Security

In recent months it has become very common to hear reports of information security incidents occurring on airlines around the world. This time, the affected company is SpiceJet, one ofRead More →

Vulnerability in Code Snippets, WordPress plugin, affects more than 200,000 websites

2020-01-30
On: January 30, 2020
In: Cyber Security

WordPress is the world’s most popular content management system (CMS), and administrators of these sites use a wide range of plugins to add & modify some aesthetic aspects and functionalities,Read More →

Cyber weapons company executives arrested. Government agencies, their biggest clients

2020-01-29
On: January 29, 2020
In: Cyber Security

It is well known that there are multiple companies that offer spying software (also known as spyware) to governments around the world to perform follow-up activities against dissidents, activists orRead More →

New standards and legislation for IoT devices cybersecurity are announced

2020-01-29
On: January 29, 2020
In: Cyber Security

Internet-connected devices have dramatically burst into multiple aspects of our lives, a situation that has taken even the most prominent cybersecurity experts by surprise, whose expectations about the use ofRead More →

Posts navigation

Previous 1 … 127 128

Popular posts:

  • Got warning “Unusual Instagram login attempt from Samsung sm-g935ft”? Nobody is hacking your InstagramGot warning “Unusual Instagram login attempt from…
  • Instashell: Free tool to hack Instagram accountsInstashell: Free tool to hack Instagram accounts
  • How to hack Twitter accounts with just 10 commands using TweetshellHow to hack Twitter accounts with just 10 commands…
  • How to hack WiFi routers from your smartphone with just 15 commandsHow to hack WiFi routers from your smartphone with…
  • How to hack via smartphone like Mr. Robot using TermuxHow to hack via smartphone like Mr. Robot using Termux
  • New scam and WhatsApp virus: The free Coca Cola fridgeNew scam and WhatsApp virus: The free Coca Cola fridge
  • Using TermGuard free antivirus in Termux to protect yourself while you are hacking othersUsing TermGuard free antivirus in Termux to protect…
  • Create your own wordlist to brute force a website, using CewlCreate your own wordlist to brute force a website,…
  • Encrochat, the encrypted phone used by cartels and criminals, was hacked by police. Clients are being arrestedEncrochat, the encrypted phone used by cartels and…
  • Top 10 underground Telegram bots to find personal information of people for background verificationTop 10 underground Telegram bots to find personal…

Vulnerabilities

Two critical vulnerabilities in Cisco email, web and chat applications allow threat actors to steal confidential data

citrix hack

Citrix Application Delivery Management (ADM) critical vulnerabilities allow taking control of the servers via password reset

Demonic Vulnerability (CVE-2022-32969). Browser extension cryptocurrency wallets like Metamask, Phantom, and Brave affected by vulnerability. Allows stealing funds from wallets

4 Critical Vulnerabilities in Chrome Browser Affect Millions of Users: Update Immediately

Eight critical vulnerabilities in ICS devices allow hackers to take control over access to buildings and lock or unlock doors at will

View All

Data Breach

Pegasus Airlines leaks 23 million confidential files containing staff photos, signatures, flight records, and more

Biggest South African pharmacy company Dis-chem was hacked

Indian Government’s eHospital system exposed 2.48 billion medical records due to misconfigured server

Internet and telephone services collapse in several French cities; attackers intentionally cut fibre optic cables

FOX News leaks 58 GB of confidential data containing content management details and employees’ personal information

Personal data of 120,000 Russian soldiers hacked and leaked on the Internet

The Lapsus$ hacking group was not completely taken down and has attacked again

View All

Tutorials

How to crack the password of a ZIP file with Kali Linux

How to find names, phone numbers, email addresses and more personal data of any Instagram user

How cyber criminals hide phishing website on the Internet?

Comprehensive Maryham framework tutorial: OSINT tools to increase your employees’ information security awareness

How to hack anyone using just a QR code?

Prices of stolen data on the Dark Web

How to use Leakix, the new search engine for cybersecurity professionals that makes it easier to detect vulnerable devices

HOW HACKERS CREATE AN ANDROID SMARTPHONE VIRUS USING AHMYTH RAT AND SPY ON ANYONE?

Top 5 techniques used to hack into Bluetooth devices

The best hacking tools for cybersecurity professionals

7 easy steps to install a virtual image on android phone to surf darknet and protect your identity

How to find location of a phone with just the phone number free of cost?

Tutorial to install Kali hacking tools in your smartphone without rooting it. Hacking on the go

10 best hacking applications for Android mobile phones

How cyber criminals insert ransomware or malware in image with just 5 commands & hack with?

L0phtCrack: The security tool to recover Windows passwords through using different attacks

View All

Virus

Cybercriminals exploit Google search results for “download CCleaner” to deliver malware

This new malware can steal cryptocurrency from any wallet and has already done it

This simple phishing email hides fileless malware strains AveMariaRAT, BitRAT, and PandoraHVNC to infect devices no matter what antivirus they use

GoodWill computer virus forces victims to do to charity and help poor people in place of demanding a ransom

Hackers use image files with malicious PHP scripts to steal credit card data on e-commerce websites

View All
  • Facebook
  • Twitter
  • YouTube
  • Telegram
  • Mail

© 2022 All Rights Reserved
info@iicybersecurity.com

Posting....