Threats Archives - Ibnshehu
Wednesday, October 23, 2019
Home Threats

Threats

A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.

yaazhini

Yaazhini – Free Android APK & API Vulnerability Scanner

Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of...
jsvirus

Attackers distribute new JavaScript-based trojan MonsterInstall in form of Game Cheats

MonsterInstall trojan will gain persistence by adding itself to the infected system’s autorun, in order to get automatically launched after the machine...
vlc

Be Alerted! Playing Untrusted Videos On VLC Player Could Hack Your Computer

If you use VLC media player on your computer and haven't updated it recently, don't you even dare to play any untrusted,...
End of GandCrab

End of GandCrab – New Free Decryptor Tool that let Victims to Unlock All...

Decryptor tool released for the notorious GandCrab ransomware let’s victim’s to unlock the files infected with any version of GandCrab. The tools...
echobot

New Version of Echobot Botnet using 26 Powerful Exploits to Attack Oracle, D-Link, Dell...

New Mirai level Botnet Echobot using 26 different exploits for the infection vectors that leveraging the vulnerabilities in Oracle, D-Link, Dell, LINKSYS,...
FIN8 hacker group

FIN8 Hacker Group using Highly Sophisticated ShellTea Malware to Attack Hospitality Sector

FIN8 hacker group is back with a new highly sophisticated variant of the ShellTea malware and carried out attacks against hotel and...

Stay connected

0FansLike
1,728FollowersFollow
13,900SubscribersSubscribe

Latest article

DetExploit

DetExploit – Software That Detect Vulnerable Applications, Not-Installed OS Updates And Notify To User

Abstract DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them...
PrivExchange

PrivExchange – Exchange Your Privileges For Domain Admin Privs By Abusing Exchange

POC tools accompanying the blog Abusing Exchange: One API call away from Domain Admin. Requirements These tools...
threat intelligence

ACT Platform – Open platform for collection and exchange of threat intelligence information

Semi-Automated Cyber Threat Intelligence (ACT) is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security...