Home Tranning - Hacking

Tranning - Hacking

All the blog posts about education and stuff

How To Keep Your Mobile Safe From Cyber Security Threats

Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You can switch from monitoring work emails to playing the latest games, to live...

3 Reasons why SAAS Business need to Concentrate on website Security

Businesses that are growing are always trying to expand in all departments and to do that they need a website that portrays their business, customers, the value they generate and...

Commando VM 2.0 – A new version of Offensive Pentesting VM

Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community and red teamers with updated hacking tools and new features such as Kali Linux, Docker...

[BlackHat USA 2019] Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon...

After this year’s Black Hat Asia, it’s time for Paula to rock at the Black Hat USA in Las Vegas! On August 8th during The Black Hat USA 2019, Paula Januszkiewicz gave an extremely technical and...

Ad Inserter Plugin Let Hackers to Execute Arbitrary PHP Code

A critical remote code execution vulnerability in WordPress plugin Ad Inserter, let hackers execute arbitrary PHP code in the vulnerable installations. The vulnerability was discovered by Wordfence security team and the...

Apple bug bounty program – Rewards Up to $1 Million

Apple expands its bug bounty program to cover all operating systems that include macOS, watchOS, tvOS, iPadOS, and iCloud along with the iOS bug bounty program. The tech giant has confirmed...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

How To Keep Your Mobile Safe From Cyber Security Threats

Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You can switch from monitoring work emails to playing the latest games, to live...

3 Reasons why SAAS Business need to Concentrate on website Security

Businesses that are growing are always trying to expand in all departments and to do that they need a website that portrays their business, customers, the value they generate and...

Commando VM 2.0 – A new version of Offensive Pentesting VM

Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community and red teamers with updated hacking tools and new features such as Kali Linux, Docker...

APLICATIONS

Google Pays Researcher Record $112,500 for Android Flaw

The bug bounty reward, given to a researcher who submitted a working remote exploit chain, is Google's highest for an Android bug.Google has...

HOT NEWS