Home Tranning - Hacking

Tranning - Hacking

All the blog posts about education and stuff

Cisco Released Critical Security Updates for Vulnerabilities

Cisco Released critical Security Updates for many of its product where they addressed 27 new vulnerabilities which categorized under Critical, High and Medium. Some of the critical Vulnerabilities allows a remote...

Microsoft Launches Identity Bounty program That Rewards Up to $100,000

Microsoft launches Identity Bounty program that offers bug bounty hunters up to $100,000. For security researchers who discover a security vulnerability in the Identity services would payout between $500 to...

LabCorp Security Breach Puts Millions of Patient Records at Risk

LabCorp Security Breach puts millions of patient records at risk, LabCorp serves more than 115 million patient annually. On July 14th hackers got access to the LabCorp’s network and their...

iPhone Users: This Mobile Malware Could Allow Cybercriminals to Track Your Location

The iPhone and many of the apps designed to live on the device have the ability to track our location. Whenever they set up these apps, however, users get the...

Most Advanced Backdoor Obfuscation and Evasion Technique

Cybercriminals are using the most sophisticated techniques to bypass the security controls in a various organization such as  IT, medical, manufacturing industries, energy sectors, even government entities. Sometimes developers are creating...

Oracle Patch Update to Address 334 Vulnerabilities Across All the Products

Oracle Releases Critical Patch Updates that contains security fixes for 334 products across all the families. The Oracle Patch Update covers products including Oracle Database Server, Oracle Global Lifecycle Management, Oracle...

Blackgear Cyberespionage Abuses Social Media Services To Evade Detection

Blackgear Cyberespionage campaign is active at least from 2008, the threat actors behind the campaign use various malware tools such as the Protux and Elirks backdoor. Trend Micro Security researchers spotted...

How to build and run a Security Operations Center

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise. This includes a vast array of sophisticated detection...

Administrator of The Infamous Silk Road Market Extradited To US To Face Charges

The US Attorney for the Southern District of New York announced the extradition of 30-year-old Irish Man Gary Davis who goes with the online handle “Libertas”. He was arrested in...

Six Things your Enterprise Needs to Learn from the DNC Hacking Indictment

All politics aside, the United States Department of Justice on Friday unsealed a judicial indictment against a number of individuals alleged to be from Russia’s intelligence services engaged in activities...

APLICATIONS

A Look Back At 2017 – Tools & News Highlights

So here we are in 2018, taking a look back at 2017, quite a year it was. We somehow forgot to do this...

HOT NEWS