ethicalhackersacademy
Top 10 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing – 2020

Top 10 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing – 2020

We all know very well that getting or gathering any information by using various tools become really easy. In this article, we...
GhostDNS

GhostDNS Router Exploit Kit Source Code Leaked to Antivirus Company

Recently, the security researchers at Avast have managed to gain unrestricted access to the components of the GhostDNS exploit kit after the...
Critical Bluetooth Vulnerability Let Hackers Compromise Billion of Devices

Critical Bluetooth Vulnerability Let Hackers Compromise Billion of Devices

University researchers found a security vulnerability in Bluetooth technology allows an attacker to impersonate the identity of another device with the user...
vBulletin

vBulletin Forum Software Silently Fixed Unrevealed Critical Vulnerability – Update Now!!

Recently, the vBulletin project developers have released a patch for the vulnerability in vBulletin 5 Connect versions prior to 5.5.2.
Malware Via Pirated Movies

Microsoft Warns That Hackers Drop Dangerous Malware Via Pirated Movies

With most of the countries stopped and quarantined, the consumption of the internet has really skyrocketed and is at unprecedented levels. But,...
The “Florentine Banker” Cybercrime Gang Trick C Level Executives From 3 British Firms To Send Them £1.5 M

The “Florentine Banker” Cybercrime Gang Trick C Level Executives From 3 British Firms To...

A cybercrime gang is known as 'Florentine Banker,' steal more than 1.1M GBP by tricking the top-level executives of the 3 British...
Beware!! State-Sponsored Hackers are using COVID-19 Lures to Steal Google Account Credentials

Beware!! State-Sponsored Hackers are using COVID-19 Lures to Steal Google Account Credentials

State-sponsored hackers are continuously using COVID-19 pandemic to lure users simply to steal the Google Accounts credentials and sensitive data.
Malicious Code Via RDP

Researchers Discovered a New Method that Let Hackers to Run Malicious Code Via RDP

Security researchers from Cymulate discovered a new hidden malware defense evasion technique that let hackers run malicious code using Microsoft’s Remote Desktop...
RubyGems

700 Malicious Gems Uploaded by Hackers to RubyGems Repository

As per the latest report by the security researchers, it has been stated that more than 700 malicious Gems were uploaded by...
Several Critical RCE Bugs In HP Support Assistant Expose Windows PCs To Remote Attacks

Several Critical RCE Bugs In HP Support Assistant Expose Windows PCs To Remote Attacks

Recently, several critical vulnerabilities in HP Support Assistant exposed Windows computers to remote code execution (RCE) attacks, that could easily enable the...