Hacking is made easier than it would otherwise have been, due to a popular penetration testing tool called Metasploit. Offering a broad platform for pen-testing and exploit development, the Metasploit Framework has a suite of extensively used to... Read more
Recently a spammer group has started to execute a clever trick that has helped them to bypass email filters and security systems, landing them in more than the usual numbers of inboxes. The trick relies on a quirk in RFC791 — a standard that des... Read more
The .ABCD virus that was first discovered in September 2019 has been updated with several new features and is now a Ransomware-as-a-Service (RaaS) called LockBit. a new data leak website was launched by the attackers behind this ransomware and t... Read more
Armed with an undetectable strand of malware, attackers are targeting misconfigured cloud-based docker instances running on Linux distributions. The malware strand that is dubbed as Doki is a part of Ngrok Cryptominer Botnet campaign that has be... Read more
A vital role is played by the Transport Layer Security (TLS) protocol in securing all communications between website servers and web browsing, email, instant messaging, and Voice over IP (VoIP) applications. implementation-level issu... Read more