Information Gathering
Information gathering is the first step of Ethical Hacking, where the penetration tester or even hackers gather information on their…
Information gathering is the first step of Ethical Hacking, where the penetration tester or even hackers gather information on their…
Xerror is an automated penetration tool, which will help security professionals and non professionals to automate their pentesting tasks. Xerror…
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID tag consists of…
Hackers hack 380 Million accounts of Spotify with the help of its Database. Spotify user credentials compiled by hackers found…
Indian Government bans 43 more mobile apps Under Section 69A of the Information Technology Act. The action is taken based…
Drupal has fixed a critical bug that could allow hackers to gain fullaccess to vulnerable websites. Currently Drupal is the…
BigBasket Data Breach 2 Crore Users data leaked BigBasket is India’s one of the largest Online Food and Grocery store…
Chinese hacking competition Tianfu cup find a security breach in some of the most used software such as IOS 14,…
source code : “NEW TARGETS FOR HACKERS” Ubisoft and Crytek the most famous gaming internation company. Both company network has…
Adobe issued an out of band updated today for Experience Manager, Experience Manager Forms, Adobe Acrobat and Reader and Download…