PRINT
PRINT
SEND MAIL
SEND MAIL

Category: TOP 10 STORIES

TUTORIALS

Earn Bitcoins just by surfing Online !

Use CryptoTab as your default browser to maximize your revenue Mining speed increases when your browser is active. Use CryptoTab browser for your everyday activities, visit your favorite sites, watch movies online, and take advantage of maximum mining power. Browser with built-in mining CryptoTab Browser includes built-in mining algorithm that allows using your computer resources more effectively than in extension format. It boosts your mining speed up to 8 times and increases BTC earnings. Enhance your browser with over 150 thousand extensions Set up…

TUTORIALS

Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon…

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

Cyber ThreatsTOP 10 STORIES

Cyber crime most significant harm in UK, says top cyber cop

Cyber crime is the biggest evolving crime type in the UK and beyond in terms of volume and complexity, according to detective chief superintendent Pete O’Doherty, lead of cyber and head of economic crime at the City of London Police. “But it is difficult to police, because unlike other crimes where there is an offender, victim and location, cyber crime tends to be multi-national. If you look at the globalisation of goods, people and services, and an epic evolution in technology, it is without…

Cyber ThreatsTOP 10 STORIES

Is this why Jamal Khashoggi was killed? ‘Hacked’ WhatsApp messages reveal Saudi columnist called Crown Prince a ‘beast’ and ‘Pac-Man’ who devoured his enemies

Newly revealed WhatsApp messages sent by murdered Saudi journalist Jamal Khashoggi just weeks before his death could provide a crucial insight into why he was killed. In the WhatsApp exchange, between him and Montreal-based activist Omar Abdulaziz, Khashoggi slams Saudi Crown Prince Mohammed Bin Salman – calling him a ‘pac man’ who devours his enemies. Abdulaziz, who revealed the messages to CNN, said he believes they were hacked in August by Saudi authorities just two months before Khashoggi’s brutal killing at the consulate in Istanbul. View full…

Cyber ThreatsTOP 10 STORIES

Android WARNING: These Google Play Store apps can STEAL your money, are YOU affected?

Android users are being warned about some dangerous apps that were found on the Google Play Store which are loaded with nefarious malware. Android is one of the most used pieces of software in the world, with more than two billion active devices running Google’s mobile OS every month. But it has also been the subject of a number of high profile security risks, including the Judy malware campaign. View full story ORIGINAL SOURCE: The Express The post Android WARNING: These Google Play Store apps…

Cyber ThreatsTOP 10 STORIES

Warning: Malware, rogue users can spy on some apps’ HTTPS crypto – by whipping them with a CAT o’ nine TLS

Crypto boffins have found a way to exploit side-channel information to downgrade most of the current TLS implementations, thanks to ongoing support for outmoded RSA key exchanges. In a paper published on Friday, “The 9 Lives of Bleichenbacher’s CAT: New Cache ATtacks on TLS Implementations,” co-authors Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom describe an updated version of an attack, first outlined by Swiss cryptographer Daniel Bleichenbacher two decades ago. View full story ORIGINAL SOURCE: The Register The post Warning:…

Cyber ThreatsTOP 10 STORIES

Someone hacked printers worldwide, urging people to subscribe to PewDiePie

The fight over who gets to have the most-subscribed channel on YouTube spilled into the real world months ago when Felix “PewDiePie” Kjellberg fans started campaigning to raise awareness of the Swedish star. The grassroots effort has, for the most part, been in good fun — but recently, people on social media have reported being hacked by someone who is urging them to subscribe to PewDiePie. View full story ORIGINAL SOURCE: The Verge The post Someone hacked printers worldwide, urging people to subscribe to PewDiePie appeared…

Cyber ThreatsTOP 10 STORIES

Marriott sued hours after announcing data breach

Hours after announcing a data breach on Friday, two Oregon men sued international hotel chain Marriott for exposing their data. Their lawsuit was followed hours later by another one filed in the state of Maryland. Both lawsuits are seeking class-action status. While plaintiffs in the Maryland lawsuit didn’t specify the amount of damages they were seeking from Marriott, the plaintiffs in the Oregon lawsuit want $12.5 billion in costs and losses. View full story ORIGINAL SOURCE: ZDNet The post Marriott sued hours after announcing…

Cyber ThreatsTOP 10 STORIES

Cyber attack victims face disputes with insurers.

Cyber attacks are increasingly causing acrimonious fights between corporate victims and their insurance companies, raising questions about the value of policies offering protection against damage from hacking. Cyber insurance is a fast-growing market, with sales of policies growing by about 25 per cent a year according to a recent report from RBC Capital Markets. But as the business expands there are growing numbers of disputes. View full story ORIGINAL SOURCE: FT The post Cyber attack victims face disputes with insurers. appeared first on IT…

Cyber ThreatsTOP 10 STORIES

Singapore banks offered $21M in funds to boost cybersecurity capabilities

Financial institutions in Singapore now have access to a S$30 million (US$21.88 million) grant that they can use to boost their cybersecurity operations and skillsets. Monetary Authority of Singapore (MAS) unveiled the new Cybersecurity Capabilities Grant that it said aimed to beef up the local financial sector’s cyber resilience and help banks develop local cybersecurity talent. View full story ORIGINAL SOURCE: ZDNet The post Singapore banks offered $21M in funds to boost cybersecurity capabilities appeared first on IT SECURITY GURU.

Cyber ThreatsTOP 10 STORIES

Marriott hack hits 500 million Starwood guests

The records of 500 million customers of the hotel group Marriott International have been involved in a data breach. The hotel chain said the guest reservation database of its Starwood division had been compromised by an unauthorised party. It said an internal investigation found an attacker had been able to access the Starwood network since 2014. View full story ORIGINAL SOURCE: BBC The post Marriott hack hits 500 million Starwood guests appeared first on IT SECURITY GURU.