cyber security
PoC Exploit Released for QNAP QTS zero-day RCE Flaw
Researchers have shown a proof-of-concept (PoC) attack for a zero-day remote code execution (RCE) flaw in the QTS operating system from QNAP.Users of QNAP's Network-Attached Storage (NAS) devices,...
Cyber Security News
PoC Exploit Published for 0-day Vulnerability in Google Chrome
A proof-of-concept (PoC) exploit for a critical zero-day vulnerability (CVE-2024-4947) in Google Chrome has been made public.The potential for exploitation of this vulnerability,...
PoC
Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation
What is an Indicator of Attack (IOA)IoAs is some events that could reveal an active attack before indicators of compromise become visible.The use...
PoC
Android Ecosystem Contains Several Hidden Patch Gaps that Can be Exploited by Hackers
The Android operating system is one of the most widely used platforms with 2 billion active users at the same time it facing a...
Password Attacks
Hackers Can Steal Password Hashes & Crash Windows systems Automatically with Microsoft Outlook and OLE
The researcher discovered a flaw that combined with Microsoft Outlook and OLE which leads to steal the Password hash and eventually crash the windows...
CVE/vulnerability
Critical Flaw in Popular BitTorrent Transmission Client Leads to an Attacker Perform Remote Hack into Your PC
A critical flaw discovered in BitTorrent Transmission client app that allows an attacker can remotely control the victims PC by using a method called...
Infosec- Resources
Risk with Steganography and Importance of running Steganalysis with Network Systems
Steganography is an art of hiding messages covert way so that exclusive the sender and recipient know the original message.This technique permits sender and...
Malware
Using n1n3 to Simulate an Evasive Fileless Malware – Proof Of Concept
Fileless malware are types of malicious code used in cyber attacks that don’t use files to launch the attack and carry on the infection...
PoC
Hackers can use Surveillance Cameras and Infrared Light to Transfer Signals to Malware
Organizations use to protect their internal networks from Internet attacks by using firewalls, intrusion detection systems(IDSs) and intrusion prevention systems (IPSs). For a higher...
PoC
Critical Vulnerability with OnePlus devices allows Remote Exploitation
Security specialists from Alephsecurity found new insignificant vulnerabilities (CVE-2017-5948, CVE-2017-8850, CVE-2017-8851, CVE-2016-10370) on OnePlus One/X/2/3/3T OxygenOS and HydrogenOS.They vulnerabilities influence with the most recent...
Backdoor
Millions of Smartphones are Vulnerable to inject Backdoor via open Ports
A Recent Research Revealed by University of Michigan Research team, Open Ports Create Backdoors in Millions of Smartphones .This Vulnerability Existing in Low secured Server...