Skip to main content

Posts

Showing posts from July, 2020

Boot Pendrive without any "SOFTWARE"

Boot Your PENDRIVE without using any software ✔ Scroll Down👍 Steps : Given Below Click here to download Thanks for Coming & Don't forgot to "SUBSCRIBE"

Zoom App how "HACKED" with use of One small TOOL 😅

zWARdail - This is the Tool name Using to hack the "ZOOM" meeting application Something about zwaredail:) As the Coronavirus pandemic continues to force people to work from home, countless companies are now holding daily meetings using videoconferencing services from Zoom . But without the protection of a password, there’s a decent chance your next Zoom meeting could be “Zoom bombed” — attended or disrupted by someone who doesn’t belong. And according to data gathered by a new automated Zoom meeting discovery tool dubbed “ zWarDial ,” a crazy number of meetings at major corporations are not being protected by a password. This is tool image 😁 Each Zoom conference call is assigned a Meeting ID that consists of 9 to 11 digits. Naturally, hackers have figured out they can simply guess or automate the guessing of random IDs within that space of digits. Security experts at Check Point Research did exactly that last summer , and found they were able to predict approxima...

ADOBE PHOTOSHOP BUG😱

Emergency Update Addressed Multiple Adobe Photoshop Vulnerabilities Attribution.  Adobe have issued an out-of-band update right after the Patch Tuesday update bundle. This update addressed multiple vulnerabilities across different products, including critical vulnerabilities in Adobe Photoshop. Critical Adobe Photoshop Vulnerabilities Fixed Adobe fixed five different critical severity vulnerabilities in Adobe Photoshop. As stated in their advisory, the bugs included two out-of-bounds read flaws (CVE-2020-9683, CVE-2020-9686) and three out-of-bounds write flaws (CVE-2020-9684, CVE-2020-9685, CVE-2020-9687). When exploited, these bugs could allow an attacker to execute arbitrary codes on the target system in the context of the current user. The vulnerabilities affected Adobe Photoshop CC 2019 version 20.0.9 and earlier and Photoshop 2020 version 21.2 and earlier.  Adobe subsequently patched the flaws with the release of Photoshop CC 2019 v.20.0.10 and Photoshop CC v.21.2.1.

Hackers News😱

Hackers actively exploit high-severity networking vulnerabilities. Hackers are actively exploiting two unrelated high-severity vulnerabilities that allow unauthenticated access or even a complete takeover of networks run by Fortune 500 companies and government organizations. The most serious exploits are targeting a critical vulnerability in F5’s  Big-IP advanced delivery controller , a device that’s typically placed between a perimeter firewall and a Web application to handle load balancing and other tasks. The vulnerability, which  F5 patched three weeks ago , allows unauthenticated attackers to remotely run commands or code of their choice. Attackers can then use their control of the device to hijack the internal network it’s connected to.

NEW UPDATED OS😍CHECK IT🔥

Ubuntu Web: A Chrome OS Alternative Linux With Firefox Coming Soon    The world is moving toward cloud-based services, we can perform almost every task using a single Web browser. This is one of the reasons why Chrome OS integrated with the Google Chrome web browser has become the most popular web-centric operating system. Even though Chrome OS uses Linux kernel under the hood, it is exclusively available to run only on Google’s hardware like Chromebook. Hence, if you’re looking for an alternative, soon you’ll be able to experience the potential of cloud computing right on your laptop using Ubuntu Web. Ubuntu Web OS With Firefox Browser Ubuntu Web is a new project that aims to build a Chrome OS alternative operating system combining the power of Ubuntu Linux and Mozilla’s Firefox browser. Unlike Chrome OS, it is based on Firefox that you can probably run on any computer. Interestingly, the project was started by the same young developer,  Rudra Saraswat , who recently lau...

OMG INTERESTING HACKING NEWS✨

Hi Guys :) 21-Year-Old Cypriot Hacker Extradited to U.S. Over Fraud and Extortion Charges. The United States Department of Justice has extradited two criminals from the Republic of Cyprus—one is a computer hacker suspected of cyber intrusions and extortion, and the other is a money launderer with known connections to the terrorist organization Hezbollah. Both suspects— Joshua Polloso Epifaniou , 21, a resident of Nicosia, and Ghassan Diab , 37, a citizen of Lebanon—were arrested earlier last year and extradited to the United States last weekend. According to the indictment , Epifaniou conducted a brute force attack against the Phoenix-based online review portal Ripoff Report (ROR) in October 2016 and successfully override ROR's login and password protection to gain access to its database through an existing account associated with a ROR employee. In November 2016, Epifaniou tried to extort the company by emailing ROR's CEO with a hyperlink to a video demonstrati...

REMOTE CODE EXECUTION😱

SIGRed: Another Critical Wormable Remote Code Execution Vulnerability Attackers often abuse Windows DNS servers to gain access to targeted networks. The recent discovery of SIGRed, a critical, wormable remote code execution (RCE) vulnerability in the Windows DNS server can probably prove to be a jackpot for threat actors. This is not just another vulnerability Check Point security researcher Sagi Tzaik found the vulnerability ( CVE-2020-1350 ) that existed in the operating system's code for 17 years. The successful exploitation of such a vulnerability could have a severe impact. Microsoft  has warned that the vulnerability (CVSS base score of 10.0) could allow an attacker to craft malicious DNS queries for Windows DNS servers (versions from 2003 to 2019), and achieve arbitrary code execution that could lead to the breach of an organizations’ entire infrastructure. When triggered by a malicious DNS query, the vulnerability leads to a heap-based buffer overflow, allowing the attacker...

News About Russia Covid Medicine

Russian hacking group linked to intelligence services trying to steal COVID-19 vaccine. Russia has claimed that it has successfully completed clinical trials of a COVID-19 vaccine Amid Russian claims that it has successfully completed clinical trials of a COVID-19 vaccine, UK cyber-security agency said on Thursday that a hacking group linked to Moscow's intelligence services is trying to steal coronavirus vaccine research.  A joint statement by Britain, the United States and Canada said that hacking group APT29 is targeting target organisations involved in COVID-19 vaccine development. Britain's National Cyber Security Centre (NCSC) said that APT29, also named “the Dukes” or “Cozy Bear” almost certainly operate as part of Russian intelligence services. The assessment is also supported by partners at the Canadian Communication Security Establishment (CSE), the US Department for Homeland Security (DHS) Cybersecurity Infrastructure Security Agency (CISA) and the National Security ...

Ransomware 🥺

Hi guys this news about VIRUS RANSOMWARE Please be aware of this virus in this corona time. More details given below😳 Cybercriminals Turning Bullies; Ransomware the Latest Weapon of Torture In the current threat landscape, ransomware attackers not only encrypt your data but also steal it. This suggests that falling victim to ransomware attacks has become more dangerous than ever. What’s going on? Getting locked out of your network is damaging enough but leaked data can create additional problems for an organization. The stolen data is used as leverage, in an attempt to bully organizations into paying up the demanded ransom. This means that companies hit by ransomware are obligated to pay the ransomware operators instead of restoring the network themselves otherwise, the stolen data will be  leaked . "The takeaway" The bottom line is that   it is possible to avoid falling victim to such vicious crimes by improving the overall cybersecurity hygiene. Moreover, it is imperative ...

Twitter hack detail News

Hi guys🙂 💥 I'm your kishor 💥 Twitter’s massive attack: What we know after Apple, Biden, Obama, Musk, and others tweeted a bitcoin scam Multiple law enforcement investigations , including one from the Federal Bureau of Investigation, are now actively probing the situation over far a deeper concern: that the exploited vulnerability in Twitter’s systems — a result it seems of mid-level employees having powerful access to site-wide admin tools that can fall into the wrong hands — has exposed serious security risks for the platform’s most powerful users. Lawmakers are  hounding Twitter for more transparency around the incident , and it seems likely the attack will have longstanding consequences not just for Twitter’s own internal tools and security, but for the broaden cybersecurity industry and every high-profile Twitter user on the platform, too. We still don’t know how exactly the hack happened or even to what extent Twitter’s own systems were compromised. But following the unprec...