Reverse Shell Cheat Sheet
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterward you’ll probably want an interactive shell.
If it’s not possible...
Data of 108 Million Bets and User is Leaked by Online Casino Group
Security researcher Justine Paine discovered a data leak this week from an ElasticSearch server. The leak involved over 108 million bets and user data from...
Best Hacking Movies That You Should Watch Right Now
If you are a geek, a coder, or a hacker then you must be the one who likes movies based on hacking and coding. Such...
Best Hacking Documentaries That You Should Watch Right Now
In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.
Basecamp Successfully Defends Against Credential Stuffing Attack
Basecamp successfully blocked an hour-long credential stuffing attack targeting its platform on January 29, with only around 100 out of the company's advertised user base...
Why not hack a hacker?
Tobias Fromel, A Germany-based programmer whose files were encrypted through Muhstik ransomware. Well, the hacker who hacked the hacker, I know pretty confusing. He...
The Fascinating Hacker Tools of Mr. Robot
Hacking, for the most part in popular culture, has always been misrepresented. The producers of these media focus more on getting the typical "oh...
Google Play Store: A hub for spreading malware?
A report by Russian security firm Doctor Web has suggested that several of the Google Play Store's apps were spread malware known as "The...
Bitcoin Robbery Through Fake Tor Browser
Through the years, Bitcoin and Tor have gone hand in hand due to their assurance of anonymity and privacy. But it seems that in...
Child Pornography Website Taken Down from Dark Web
One of the most nefarious child pornography website which went by the name of “Welcome to Video” has been taken down and seized. Reportedly,...