Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

Category: News

Google Launches Backstory — A New Cyber Security Tool for Businesses

Google’s one-year-old cybersecurity venture Chronicle today announced its first commercial product, called Backstory, a cloud-based enterprise-level threat analytics platform that has been designed to help companies quickly investigate incidents, pinpoint vulnerabilities and hunt for potential threats. Network infrastructures at most enterprises regularly generate enormous amounts of network data and logs on a daily basis that […]

IIS Vulnerability Triggers a Denial-of-Service

Microsoft has recently rolled-out updates for addressing a vulnerability in its Internet Information Services (IIS). Allegedly, this Microsoft IIS bug could cause a denial of service since the CPU usage rises to 100%. Microsoft IIS Bug Leading To DoS Microsoft has warned users of a serious security vulnerability targeting Internet Information Services (IIS). In its […]

Australia Says State Actor Responsible For Parliament System Hack

Australia on Monday said a “sophisticated state actor” had hacked the country’s main political parties and parliament, just weeks before a closely fought election. Prime Minister Scott Morrison told lawmakers security agencies looking at a hack of lawmakers “also became aware that the networks of some political parties; Liberal, Labor and Nationals have also been […]

An Overview of UBA, SIEM and SOAR Solutions: What Are the Differences?

In pursuit of safeguarding proprietary data, companies are increasingly integrating information security systems into their IT departments. The motivation boils down to the crucial role of information in business processes nowadays. Since the range of available information security systems is continuously expanding, companies need to have an idea of the types of these systems and, […]

Domain Name Hierarchy (Registry vs Registrar)

Domain registration and management involves multiple parties with different roles, like Registry, Registrar, Reseller & Registrant (Domain Name Hierarchy). On top of those 3, there’s also ICANN (Internet Corporation for Assigned Names and Numbers). We’ll quickly cover all these roles. ICANN ICANN is non-profit entity comprised of individuals, government, law enforcement, intellectual property law and […]

DailyMotion Victim of Credential Stuffing Attack

Popular video sharing platform DailyMotion announced it has become the victim of a credential stuffing attack. According to an email sent to affected customers, the attack started over the weekend beginning January 19. DailyMotion is one of the most popular video-sharing sites and is ranked number 134 on the Alexa traffic ranking. What is Credential […]

Anonymous DDoS Zimbabwe’s Government sites offline

For several days, starting on Monday 14 January 2019, Zimbabweans have been without Internet access. This is as a result of the Southern Afrikan country’s government, under rumored instructions from General Chiwenga and the leadership of President Emerson Mnangagwa, decided to threaten and ordered all 4 of the country’s telecommunications to shut off the Internet […]

Fortnite Hack Could Have Compromised Many Gamers Accounts

Fortnite players have just secured their accounts marginally from a major hack. The researchers identified a vulnerability that could have risked millions of accounts. Fortunately, Epic Games patched this Fortnite bug before any wide spread exploit occurred. Fortnite Bug Allowing Massive Account Hacks Researchers from Check Point Research have disclosed a vulnerability in their recent […]

773 Million Credentials of Email & Password leaked in Massive Data Breach – Biggest Data Dump Ever Found in a Decade

Welcome to the Massive Data breach of 2019, around 773 million datas contains email addresses and passwords were breached and circulated in hacker forums. Let’s have a look into This Massive Data Breach The data set was first reported by security researcher Troy Hunt, who maintains Have I Been Pwned, a way to search whether […]

7 Best Pirate Bay Alternatives To Use When TPB Is Down [Working In 2019]

Commonly known as TPB, the popular torrent site has been around for almost 15 years currently running on domain. Over the period of this time, it went away and came back multiple times and changed domains as well. When its founders were arrested back in 2013, The Pirate Bay was outperformed by KickAss Torrents which […]

Ethical Hacking Tutorials © 2018
Skip to toolbar