Latest Posts

All posts sorted in descending order by date

gaming laptops
07Aug

The 5 Best Laptops For Any Hacker/Programmer

The 6 best and the top laptops for any programmer, cybersecurity/hacker, gamer to purchase in 2020. Starting from the lowest to the great budget laptops.Here are all of them

GirlScript CTF Writeup - August 2020 1
03Aug

GirlScript CTF Writeup – August 2020

So this weekend, I participated in a CTF challenge that was organized by GirlScript Goa. It was among the beginner level CTFs, so I was able to solve all but one problem. Nonetheless, I came in 3rd in this and here is my writeup for the solutions of the challenges that I solved. Miscellaneous Challenges […]

badPower Malware for Chargers
26Jul

BadPower can destroy your device by corrupting your fast charger

Don’t let ANYONE else use your charger. Researchers at Tencent lab has found malware and named it BadPower than can potentially melt or blast your phone by just charging.

Vulnerability Scanning and Enumeration for Pen Testing 2
16Jul

Vulnerability Scanning and Enumeration for Pen Testing

The second phase of ethical hacking and penetration testing involves two terms that are Vulnerability Scanning and Enumeration. Scanning involves taking the knowledge discovered during reconnaissance and using it to look at the network

Twitter hack
Jul

Massive Twitter Hack: Top profiles like Elon Musk, Bill Gates, Jeff Bezos got compromised!

Twitter accounts of top profiles like Bill Gates, Jeff Bezos, Elon Musk and many others got compromised due to a massive security breach and made people to lose over couple of thousand dollars in the form of bitcoin

malware
15Jul

Joker malware: a new malware which affected Google play store apps

An undetectable malware with capability to steal SMS to bypass OTP and buy premium service subscription and drain the victim’s wallet. 17k such apps removed so far.

Goole Tsunami Vulnerability Scanner
14Jul

Google makes Tsunami Vulnerability Scanner Open Source

Google has released an Open Source Web Vulnerability Scanner “Tsunami” which automates a lot of tasks for networks with thousands of devices.

MAZE attack
03Jul

Maze Ransomware Attack on Highway Authorities of India

Maze Ransomware attack on NHAI India, leaking 2gb of worth zipped sensitive data over dark web, confirmed and analyzed by Cyble (threat researcher firm).

RTX 3080
02Jul

New Nvidia GPU- RTX 3080! Leaks and other details

The next-gen Nvidia GPU is set to come in a matter of months, some of the details about them are leaking every day, but in this post, we have covered up all for you.

PS5
29Jun

PS5: All you need to Know (Price, Specs & Release)

Sony has again confirmed to launch its next-gen of PlayStation which is going to be PS5. Click to read more about the new features, specs, price detail and a lot more.

Subscribe to our Newsletter

Advertisement