Profile cover photo
Profile photo
Hawk Security Lab
Hawk Security Lab
Hawk Security Lab
About
Posts

Post has attachment
Ransomware has been around for a few years, but it has become an albatross around everyone’s neck, targeting big businesses, hospitals, financial institutions and individuals worldwide and extorting millions of dollars. Last year, we saw some major…
Add a comment...

Post has attachment
Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to execute arbitrary code, take full control over the vulnerable network equipment…
Add a comment...

Post has attachment
In a major blow to Intel, Apple is reportedly planning to use its custom-designed ARM chips in Mac computers starting as early as 2020, ultimately replacing the Intel processors running on its desktop and laptop hardware.  …
Add a comment...

Post has attachment
Security researchers at Cisco Talos have uncovered variants of a new Android Trojan that are being distributed in the wild disguising as a fake anti-virus application, dubbed “Naver Defender.”…
Add a comment...

Post has attachment
Security researchers have found a new Android malware strain that has been designed to steal data from mobile instant messaging clients. This new trojan is quite simple in its design, researcher from cyber-security firm Trustlook said in a report…
Add a comment...

Post has attachment
In an effort to prevent cryptojacking by extensions that maliciously mine digital currencies without users’ awareness, Google has implemented a new Web Store policy that bans any Chrome extension submitted to the Web Store that mines cryptocurrency. Over…
Add a comment...

Post has attachment
There are New Vulnerabilities named Spectre and Meltdown, which exploit critical vulnerabilities in modern processors have just been discovered by Expert Cyber Security researchers. These hardware bugs allow programs to steal data being processed on the…
Add a comment...

Post has attachment
I got acknowledged by Wso2 for reporting reflected XSS vulnerability After few days, the issue has been fixed and my name got published in the Wso2 Acknowledgments section. Link…
Acknowledged by Wso2
Acknowledged by Wso2
hawksecuritylab.com
Add a comment...

Post has attachment
DISCLAIMER  This tutorial is only for Educational purposes. Please don’t use these kind of attacks for unethical purposes. Burp or Burp Suite is an integrated platform for performing security testing of web applications. Information security professionals…
Add a comment...

Post has attachment
Secure Apache with Let’s Encrypt Free SSL Certificate If you are looking SSL certification for your web server to ensure privacy in communication, Let’s encrypt is the best option you have and It’s a totally free, automated, and open Certificate Authority…
Add a comment...
Wait while more posts are being loaded