Latest Posts

All posts sorted in descending order by date

gaming laptops

The 5 Best Laptops For Any Hacker/Programmer

The 6 best and the top laptops for any programmer, cybersecurity/hacker, gamer to purchase in 2020. Starting from the lowest to the great budget laptops.Here are all of them

GirlScript CTF Writeup - August 2020 1

GirlScript CTF Writeup – August 2020

So this weekend, I participated in a CTF challenge that was organized by GirlScript Goa. It was among the beginner level CTFs, so I was able to solve all but one problem. Nonetheless, I came in 3rd in this and here is my writeup for the solutions of the challenges that I solved. Miscellaneous Challenges […]

badPower Malware for Chargers

BadPower can destroy your device by corrupting your fast charger

Don’t let ANYONE else use your charger. Researchers at Tencent lab has found malware and named it BadPower than can potentially melt or blast your phone by just charging.

Vulnerability Scanning and Enumeration for Pen Testing 2

Vulnerability Scanning and Enumeration for Pen Testing

The second phase of ethical hacking and penetration testing involves two terms that are Vulnerability Scanning and Enumeration. Scanning involves taking the knowledge discovered during reconnaissance and using it to look at the network

Twitter hack

Massive Twitter Hack: Top profiles like Elon Musk, Bill Gates, Jeff Bezos got compromised!

Twitter accounts of top profiles like Bill Gates, Jeff Bezos, Elon Musk and many others got compromised due to a massive security breach and made people to lose over couple of thousand dollars in the form of bitcoin


Joker malware: a new malware which affected Google play store apps

An undetectable malware with capability to steal SMS to bypass OTP and buy premium service subscription and drain the victim’s wallet. 17k such apps removed so far.

Goole Tsunami Vulnerability Scanner

Google makes Tsunami Vulnerability Scanner Open Source

Google has released an Open Source Web Vulnerability Scanner “Tsunami” which automates a lot of tasks for networks with thousands of devices.

MAZE attack

Maze Ransomware Attack on Highway Authorities of India

Maze Ransomware attack on NHAI India, leaking 2gb of worth zipped sensitive data over dark web, confirmed and analyzed by Cyble (threat researcher firm).

RTX 3080

New Nvidia GPU- RTX 3080! Leaks and other details

The next-gen Nvidia GPU is set to come in a matter of months, some of the details about them are leaking every day, but in this post, we have covered up all for you.


PS5: All you need to Know (Price, Specs & Release)

Sony has again confirmed to launch its next-gen of PlayStation which is going to be PS5. Click to read more about the new features, specs, price detail and a lot more.

Subscribe to our Newsletter