Category Archives: News

19 Oct

Rekings is back to normal

We have recently changed our shopping CMS and we recommend our previous users to register again. We decided to sell less products and provider better support and faster delivery time. We are offering $500 discount for (Silent Office Exploit 5 CVE) to few users, Contact us at [email protected] to claim your code.

Read More
12 Sep

Microsoft Released Security Patch for for 17 Critical Vulnerabilities

Just a few moments ago Microsoft released its latest monthly Patch Tuesday update for September 2018, patching a total of 61 security vulnerabilities, 17 of which are rated as critical, 43 are rated Important, and one Moderate in severity. This month’s security updates patch vulnerabilities in Microsoft Windows, Edge, Internet Explorer, MS Office, ChakraCore, .NET

Read More
10 Sep

Tor Browser Zero-Day Exploit Revealed Online – Patch Now

Zerodium, the infamous exploit vendor that earlier this year offered $1 million for submitting a zero-day exploit for Tor Browser, today publicly revealed a critical zero-day flaw in the anonymous browsing software that could reveal your identity to the sites you visit. In a Tweet, Zerodium shared a zero-day vulnerability that resides in the NoScript

Read More
10 Sep

Chainshot Malware Attack

Newly discovered CHAINSHOT Malware attack using Adobe Flash 0-day vulnerability that carried by several Weaponized documents along with the encrypted malware payload. Researchers successfully cracked the 512-bit RSA key and decrypted the payload also the attack contains the several steps that follow each and every steps input. Attackers using the new toolkit that performed as

Read More
08 Sep

Troldesh Ransomware Spreading Via Weaponized Word Document and RDP Brute-force Attack

Troldesh Ransomware emerges again and spreads all over the world. The crypto-ransomware variant was created in Russia, the previous variant of the ransomware encrypts the files and appends “.xtbl” extension whereas the new variant adds “.no_more_ransom” extension. Quick heal labs observed the ransomware is distributed by threat actors through RDP Brute-force Attack, Spam and phishing

Read More
08 Sep

U.S. Charges North Korean Spy Over WannaCry and Sony Pictures Hack

The U.S. Department of Justice announces criminal charges against a North Korean government spy in connection with the 2017 global WannaCry ransomware attack and the 2014 Sony Pictures Entertainment hack. According to multiple government officials cited by the NY Times who are familiar with the indictment, the charges would be brought against Park Jin Hyok,

Read More
07 Sep

400,000 websites vulnerable through exposed .git directories

Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. Vladimír Smitka began his .git directory odyssey in July when he began looking at Czech websites to

Read More
07 Sep

Spyware-as-a-service firm mSpy exposes customer data in second breach in three years

For the second time in three years parental control application mSpy experienced a breach of sensitive records. Independent security researcher Nitish Shah discovered an exposed database containing the information of more than a million mSpy customers including usernames, passwords, private encryption keys call logs, text messages, contacts, notes and location data secretly collected from phones

Read More
06 Sep

Hackers Hijacked MEGA Chrome Extension To Steal Login Credentials

Hackers uploaded a malicious version of MEGA Chrome Extension to the Google Chrome store which steals users login credentials of popular websites and cryptocurrency wallets. The compromised MEGA Chrome Extension version 3.39.4 steals user’s login credentials from popular sites such as Amazon, Live, Github, Google. Also, it uses to steal login credentials of the cryptocurrency

Read More
04 Sep

Thousands of MikroTik Routers Hacked to Eavesdrop On Network Traffic

Chinese security researchers at Qihoo 360 Netlab have discovered that out of 370,000 potentially vulnerable MikroTik routers, more than 7,500 devices have been compromised to enable Socks4 proxy maliciously, allowing attackers to actively eavesdrop on the targeted network traffic since mid-July. The vulnerability in question is Winbox Any Directory File Read (CVE-2018-14847) in MikroTik routers

Read More