Latest exploits & pocs
Latest forum posts
Latest security news
  • ManageEngine SupportCenter Plus 7.90 XSS / Traversal / Password Disclosure
  • Adobe Flash Player ShaderJob Buffer Overflow
  • OpenEMR 4.2.0 Authentication Bypass
  • ApPHP Hotel Site 3.x.x SQL Injection
  • Tango DropBox 3.1.5 Active-X Heap Spray
  • Tango FTP 1.0 Active-X Heap Spray
  • WordPress Revslider 4.2.2 XSS / Information Disclosure
  • Vitubo CMS 2.3 Database Disclosure
  • Wonder CMS 0.6-Beta File Inclusion / Traversal / Disclosure
  • Just A Forum 2.1.1 Cross Site Scripting
  • Planet Source Code is shutting down
  • Relyze
  • Having a look at Dridex config
  • Gorynych/DiamondFox v4.2.0.257 - File Upload Vulnerability
  • INURLBR - Advanced Search in Multiple Search Engines
  • Interview: Dr. Engin Kirda
  • Duqu 2.0 the most sophisticated malware ever seen
  • Malware Researcher’s Handbook-Introduction: All the stuff you know before starting re
  • Ploutus ATM Malware | Samples for Analysis
  • The Pitfalls of Client-Side Authentication: Solutions to Net-Force JavaScript CTF cha
  • WikiLeaks published new Sony secrets
  • XARA data stealing flaws affect Apple iOS, OSX
  • Cybercrime is paying with 1,425% return on investment
  • Exclusive – Voidsec disclosed a number of flaws affecting Minds.com Platform
  • Intrusion Detection in AWS to meet PCI Compliance
  • OPM’s Database for Sale? Nope, It Came from Another US .Gov
  • Cyberspace under a shadow of Cyber Poisons and Antidotes
  • #OpC51 Anonymous hit systems at Canadian Government
  • Banking trojan used in a second round attack against Bundestag
  • Critical Flaws in Apple, Samsung Devices

CTB-Locker Ransomware Spreading Rapidly, Infects Thousands of Web Servers

In last few years, we saw an innumerable rise in ransomware threats ranging from Cryptowall toLocky ransomware discovered last week. Now, another genre of ransomware had been branched out from the family of CTB-Locker Ransomware with an update to infect “Websites”, according to Lawrence Abrams ofBleepingComputer. The newly...

Read More

How to Hack and Decrypt WhatsApp Database on rooted devices

WhatsApp? Almost everyone knows about it. It is a social android application, that’s enables the user to send free messages through the internet within seconds. The developers have made huge success and have high level and complex algorithms to encrypt and store the data, which changes with every update! And hence everyone uses it to send even the most...

Read More

The recent iOS 9.0.1 Update fails to fix the Lock screen Bypass flaw

Apple recently released its first update to the new iOS 9, but experts noticed that it doesn’t fix the lock screen bypass vulnerability. The flaw is considered serious because it allows to bypass the lock screen mechanism that protects the iPhone and the iPad from unauthorized access. An attacker can access users’ contacts and personal photographs...

Read More

WinRAR zero-day open million users to hack

The security researcher Mohammad Reza Espargham a new zero-day flaw is threatening million of users of the latest version of WinRAR. According to the security researcher at Vulnerability-Lab Mohammad Reza Espargham, the latest version of WinRAR 5.21 for Windows OS is vulnerable to Remote Code Execution (RCE) flaw. “A remote code execution vulnerability has...

Read More

How I hacked my IP camera, and found this backdoor account

The time has come. I bought my second IoT device – in the form of a cheap IP camera. As it was the cheapest among all others, my expectations regarding security was low. But this camera was still able to surprise me. Maybe I will disclose the camera model used in my hack in this blog later, but first I will try to contact someone regarding these issues....

Read More