ethicalhackersacademy
Hackers Steal Outlook Passwords Via Overlay Screens on Legitimate Sites

Hackers Steal Outlook Passwords Via Overlay Screens on Legitimate Sites

Nowadays, the phishing attacks are increasing at an alarming rate, and these attacks are drastically affecting and harming the business organization. Recently,...
PM Modi’s Twitter Account Hacked, Asked Followers to Donate via Cryptocurrency

PM Modi’s Twitter Account Hacked, Asked Followers to Donate via Cryptocurrency

Early on Thursday morning, Twitter confirmed that the Twitter account of Prime minister Narendra Modi got hacked. Twitter also assured that they...
Types of Malware

10 Different Types of Dangerous Malware Attack and How to Avoid them

Today's topic is basically about types of malware, yes, it's a malicious software which is basically designated to damage, impair, or exploit...
Severe Security Vulnerabilities in the Samsung Phones Let Hackers to Launch Remote Attacks

Severe Security Vulnerabilities in the Samsung Phones Let Hackers to Launch Remote Attacks

Recently, the security researchers detected a new security vulnerability in the Samsung Phones Find My Mobile app, allow hackers to Perform remote...
python tools

Most Important Python Tools for Ethical Hackers & Penetration Testers 2020

There are a variety of python tools are using in the cybersecurity industries and the python is one of the widely used...
mac Ransomware

New Ransomware “EvilQuest” Attacking macOS Users to Encrypts Users Files

A new ransomware strain that has been detected by one of the experts Thomas reed, named "EvilQuest," but now the name has...
Hackers Revealed More Than 300 Windows 10 Executables Are Vulnerable to DLL Hijacking Attack

Hackers Revealed More Than 300 Windows 10 Executables Are Vulnerable to DLL Hijacking Attack

Personal privacy and security are some of the most crucial and essential subjects that most users neglect. As recently, a security expert...
GTP

GTP Mobile Internet Protocol Bugs Let Hackers Attack 4G and 5G Networks Mobile via...

Researchers identified various vulnerabilities in connection with the GPRS Tunnelling Protocol (GTP), it is mostly managed by mobile network operators (MNOs). The...
Valak Malware Attack Microsoft Exchange Servers To Steal Enterprise Network Credentials

Valak Malware Attack Microsoft Exchange Servers To Steal Enterprise Network Credentials

Researchers uncovered a sophisticated malware named "Valak" targets Microsoft exchange servers to steal enterprise network credentials, stealing sensitive data, damage the brand...
Top 10 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing – 2020

Top 10 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing – 2020

We all know very well that getting or gathering any information by using various tools become really easy. In this article, we...