Shellcode Execution and Injection Using PowerShell

IntroductionShell code is a small piece of code, often written in assembly, used to exploit vulnerabilities or load payloads during penetration testing or attacks. It plays a critical role in delivering malicious code to a target system. PowerShell, with its…

Read More

Apple Data Breach: Source Code of Internal Apps Exposed

The threat actor known as IntelBroker on criminal forums has previously claimed to have obtained data from breaches involving Europol and AMD.IntelBroker posted on X (formerly Twitter) about accessing the source code of three internal tools used at Apple, including…

Read More

Remote Access Giant TeamViewer Hacked by Russian Spies

TeamViewer, the company behind widely used remote access tools, has confirmed an ongoing cyberattack on its corporate network. In a statement on Friday, the company attributed the breach to government-backed hackers from Russian intelligence, specifically APT29 (also known as Midnight…

Read More

Russian hackers who broke into Microsoft’sย (MSFT.O)

Russian hackers who broke into Microsoft's (MSFT.O) Russian hackers who broke into Microsoft's (MSFT.O) Russian hackers who broke into Microsoft's (MSFT.O), opens new tab systems and spied on staff inboxes earlier this year also stole emails from its customers, the tech giant…

Read More