Latest exploits & pocs
Latest forum posts
Latest security news
  • extjs Arbitrary File Read
  • Synology Photo Station 6.2-2858 Command Injection
  • Synology DiskStation Manager 5.2-5565 Cross Site Scripting
  • Synology Photo Station 6.2-2858 Cross Site Scripting
  • WordPress NewStatPress 0.9.8 Cross Site Scripting / SQL Injection
  • WordPress Landing Pages 1.8.4 Cross Site Scripting / SQL Injection
  • Acoustica Pianissimo 1.0 Build 12 Buffer Overflow
  • TCPDF Library 5.9 Arbitrary File Deletion
  • Lenovo System Update Privilege Escalation
  • Fuse Local Privilege Escalation
  • Windows Functions in Malware Analysis – Cheat Sheet – Part 1
  • Hello.
  • tutorial about how to search on internet-made by NSA
  • GetSystemPowerStatus
  • hi all
  • Writing Reverse TCP Exploit
  • Mumblehard Malware
  • [XSS] Microsoft.com
  • Hi All!
  • [XSS] Microsoft.com
  • More Evidence of mSpy Apathy Over Breach
  • Electrifying new threat - TeslaCrypt!
  • British navigation tech “eLoran” is under examination of US military to thwart GPS ja
  • Linux-based Moose worm turns routers into social network bots
  • A new iOS Bug Crashing iPhones by receiving a specific text message
  • IRS breached, hackers access data of more 100,000 taxpayers
  • IRS: Crooks Stole Data on 100K Taxpayers Via ‘Get Transcript’ Feature
  • Iran has foiled a cyber attack against the oil ministry
  • A student hired hackers to attack schools of the West Ada school district
  • Five Mistakes MSSPs Should Avoid

ISIS – Cyber Caliphate hackers are threatening Electronic War

Pro-Isis Hackers belonging to Cyber Caliphate hacking team threaten ‘Electronic War’ on US and Europe. Which are ISIS cyber capabilities? Is the Islamic State group able to engage a cyber war against Western countries? According to prominent hackers affiliated with the terrorist, the ISIS hackers have the abilities to hit computer systems in US and...

Read More

Beebone botnet has been shut down by an international operation

The Beebone botnet has been shut down in a joint operation between U.S. and European law enforcement and a number of private security companies. A new joint operation run by US and European law enforcement and a number of private security firms took down the polymorphic Beebone botnet, also known as AAEH. The operation was carried out by the FBI, the Department...

Read More

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report

The CyberEdge Group published an interesting report, titled “2015 Cyberthreat Defense Report” that in line with similar studies confirms the increase in the number of successful cyber attacks against organizations. The report analyzed data provided by 814 organizations, it surveyed IT security decision makers and practitioners in 19 industries across...

Read More

Underdist Challange solved

Underdist challenge flag >>> /root/flag.txt  The first step we loaded the virtual machine and starting the challenge!Run the netdiscover to get the target I : Code: netdiscover - i wlan1 -r 192.168.1.1/24 1 netdiscover - i wlan1 -r 192.168.1.1/24 The...

Read More

Password cracking experts decipher elusive Equation Group crypto hash

Mystery solved after crackers find Arabic word that dogged Kaspersky for weeks. Unraveling a mystery that eluded the researchers analyzing the highly advanced Equation Group the world learned about Monday, password crackers have deciphered a cryptographic hash buried in one of the hacking crew’s exploits. It’s Arabic for...

Read More