Home Tranning - Hacking

Tranning - Hacking

All the blog posts about education and stuff

Researcher Awarded $10,000 for Disclosing Critical XSS in Yahoo Mail

A Finland based security researcher named Jouko Pynnönen awarded $10,000 for disclosing critical cross-site scripting (XSS) vulnerability in the webmail version of Yahoo Email service. An attacker could exploit the vulnerability...

How to Keep Your Mobile Safe from Cyber Threats

Before smartphones were popular, people didn’t take mobile security much seriously. After all, we used to have a few contacts, some classic games, and some blurred wallpapers, what was actually...

Hackers Taping the Phone Network using SS7 Attacks

New research states that sophisticated hackers are now taping the Phone network by exploiting the SS7 protocol to steal money from the bank accounts by intercepting the messages. SS7( Signaling System...

Password Sharing – 69% of Employees Share Passwords in Workplace

A new report shows 69 percent of employees shares password in their workplaces and more than 51 percent respondents reused their password at least five times. The study was conducted by...

Hackers Taping the Phone Network using SS7 Attacks

New research states that sophisticated hackers are now taping the Phone network by exploiting the SS7 protocol to steal money from the bank accounts by intercepting the messages. SS7( Signaling System...

8 Common Hacking Techniques & 3 Ways to Avoid Them All

Hackers comes in many forms with sophisticated Hacking Techniques, While there has been a lot of discussion about online security in recent years, many people are still unfamiliar with the...

macOS Zero-day Flaw Allows Attackers to Read Passwords in Plain Text

A security researcher revealed a new critical macOS Zero-day vulnerability in the keychain that is integrated into macOS allows an attacker to read all the Stored passwords in plain text. ...

Mac Malware Steals Cookies & saved Passwords from Cryto Wallets

A new dangerous Mac Malware discovered that stealing the cookies when users visiting a website that belongs to cryptocurrency exchanges and wallet service along with saved credentials from Chrome Browers. ...

Hackers Launching ExileRAT Malware Via Microsoft PowerPoint Document

Researchers observed a new malicious campaign that delivers a powerful ExileRAT malware via Microsoft powerpoint documents using previously used C2 server infrastructure. Attackers deliver the malware via Email attachment and the...

5 Steps How To Protect Your Company Infrastructure From Insider Threats %

While most people worry about threats from hackers trying to breach their security from the outside, it’s just as, if not more, important to also protect against insider threats as...

APLICATIONS

HOT NEWS