Zephyrnet Logo

Tag: hacking tool

These Clever Tools Make VR Way More Immersive – Inside XR Design

In Inside XR Design we examine specific examples of great VR design. Today we’re looking at the clever design of Red Matter 2’s ‘grabber tools’...

Top News

Chinese Experts Uncover Details of Equation Group’s Bvp47 Covert Hacking Tool

Researchers from China's Pangu Lab have disclosed details of a "top-tier" backdoor put to use by the Equation Group, an advanced persistent threat (APT) with alleged ties to the cyber-warfare intelligence-gathering unit of the U.S. National Security Agency (NSA). Dubbed "Bvp47" owing to numerous references to the string "Bvp" and the numerical value "0x47" used in the encryption algorithm, the

FIN7 Backdoor Masquerades as Ethical Hacking Tool

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...

3D adventure thriller Beyond a Steel Sky announced for Switch

Microids announced today that it has teamed up with Revolution Software – creator of the Broken Sword series – to bring Beyond a...

Chinese Hackers Hijacked NSA-Linked Hacking Tool: Report

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...

IOTW: As The SolarWinds Hack Investigation Continues, New Insights Reveal A New…

The ongoing investigation into the SolarWinds cyber attack reveals a possible suspect—and it wasn’t the notorious Russian hacking group preliminary reports first assumed. The...

Top 10 Best Linux Distro Operating Systems For Ethical Hacking & Penetration Testing – 2020

There are different OS for Hacking and Penetration Testing with Linux distro is dedicatedly developed for Security Researchers or Ethical Hackers to...

Hackers breach FSB contractor and leak details about IoT hacking project

Per the Fronton specs, the use of the Russian language and the Cyrillic alphabet was strictly forbidden throughout the project and the source...

Years-long campaign targets hackers through trojanized hacking tools

In addition, Cybereason also says it found trojanized versions of the Chrome browser, also laced with the same njRAT remote access trojan.Suspected Vietnamese...

Exfiltrating Data from Air-Gapped Computers Using Screen Brightness

It may sound creepy and unreal, but hackers can also exfiltrate sensitive data from your computer by simply changing the brightness of the...

Prepare for Cisco, CompTIA, and More IT Certifications with this Bundle

Exams are pretty important in professional IT. You can have all the practical knowledge in the world, but technical recruiters want to see...

Latest Intelligence

spot_img
spot_img