USA Added 2 Russian and 2 Iranian Hackers In FBI List
The U.S government reports criminal accusations against two Iranian and two Russian programmers and added them to FBI's most-needed rundown.
The two Russian nationals Danil...
Ransomware Attack At Equinix Data Center
A security occurrence at Equinix has come about in ransomware getting into a portion of the server farm colocation goliath's interior frameworks.
Equinix recognized the...
Top Cybersecurity Companies Have Leaked Data on the Dark Web
According to the survey of a global application security company, ImmuniWeb, revealed that 97% of leading cybersecurity companies have data leaks or other security...
Bltooth Vulnerability Threatens
Allegedly, the Bluetooth Special Interest Group (SIG) and CERT Coordination Center at the Carnegie Mellon University (CERT/CC) have distributed security alarms with respect to...
New CDRThief Linux Malware Steals Call Details from VoIP Softswitch Systems
A new kind of Linux malware dubbed "CDRThief" has been discovered by Cybersecurity researchers that target voice over IP (VoIP) Softswitches in an attempt...
Magento online stores hacked
More than 2,000 Magento online stores have been hacked throughout the end of the week in what security specialists have portrayed as the "biggest...
Netwalk Ransomware Hit Pakistani Electricity Provider
Pakistan's K-Electric private force utility, hit by Netwalker ransomware that prompted the interruption of charging and online master administrations.
K-Electric is the sole power supplier...
Instagram retained user deleted photos and private messages even after deletion
A researcher discovered that Instagram retained photos and private direct messages on its server even after deletion, as per an online report. A bug...
Installing I2P Service
The I2P service is pretty simple to install, simply use the apt repository
Gather the binaries
$ sudo apt-add-repository ppa:i2p-maintainers/i2p
$ sudo apt-get update
$ sudo apt-get install...
Setup Proxychains in Linux
What is Proxychains?
Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...