CALL US

+91 9116117170

Tag: hacking

Potential Flaw in Zoom Lets Attackers Steal Windows Login Credentials

By Yash Kudal 0 Comment April 3, 2020

Zoom has been there for nine years, but the urgent need for an easy-to-use video application during coronavirus violence has made it a beloved tool for millions of people. Although Zoom is an effective solution for online video conferencing, it is not the best choice for privacy and security. The Windows Zoom Client is vulnerable […]

Unpatched Security Vulnerability Affects All Windows Versions

By Yash Kudal 0 Comment March 25, 2020

Microsoft released a new advisory for the safety of billions of Windows users on two critical, unpatched zero day flaw that could allow hackers to take full control of targeted computers. According to Microsoft, the unpatched vulnerabilities can affect all supported versions of the Windows operating system including Windows 10, 8.1 and Server 2008, 2012, […]

VMware Fixes Critical Vulnerability Affecting VMware Workstation Pro

By Yash Kudal 0 Comment March 21, 2020

VMware fixed Critical Vulnerability Reportedly, the vulnerability which was existed was targeting guest to host interaction. In particular, the bug allowed guest apps to issue commands to hosts. VMware emphasized that a critical vulnerability (CVE-2020-3947) exists in Workstation and Fusion. The vendors have claimed it a critical bug with a CVSS score of 9.3. The […]

Covidlock: A Tracking Application infecting Android Smartphones

By Yash Kudal 0 Comment March 20, 2020

Over the past few months, there are number of reports of hackers using the global COVID-19 pandemic to attack users to steal financial credentials and now in the latest trend, cyber criminals have launched a malicious coronovirus software application. When any user comes to the site, they will be asked to download the Android app. […]

Google Hacking For Penetration Testers

By Devashish Soni 0 Comment March 19, 2020

Google hacking or Google dorking is an advance google search technique for information gathering. These search queries can be used to gather information for arbitrary or individual targets, identify security vulnerabilities in web applications, discover files containing credentials and other sensitive data, discover error messages disclosing sensitive information Before we Begin: Before we start what […]

error: Content is protected by Cyberops !!