Profile cover photo
Profile photo
Shivanshu Singh
About
Shivanshu Singh's posts

Post has attachment
Elsa - CIA Malware to Track Geo- Location of Target

Today, June 28th 2017, WikiLeaks publishes documents from the ELSA project of the CIA. ELSA is a geo-location malware for WiFi-enabled devices like laptops running the Micorosoft Windows operating system. Once persistently installed on a target machine…

Post has attachment
Petya - Everything You Need to Know

It has been reported that variants of Petya ransomware with worm-like capabilities is spreading. The ransomware leverages etenalblue exploit, genuine psexec or wmic with appropriate credentials for a quick spread. These mechanisms are used to attempt…

Post has attachment
Hello Guys…!! Shivanshu here, Today i’m back with an all time interesting topic PHISHING . Here i will show how phishing works, i have prepared a phishing page for gmail login page. Before we start i would like to tell that this article is only for…

Post has attachment
Today, June 22nd 2017, WikiLeaks distributes archives from the Brutal Kangaroo venture of the CIA. Brutal Kangaroo is an apparatus suite for Microsoft Windows that objectives shut systems via air hole bouncing utilizing thumbdrives. Brutal Kangaroo parts…

Post has attachment
Child Pornography Child pornography is a type of child sexual misuse. Government law characterizes child pornography as any visual delineation of sexually unequivocal direct including a minor (people under 18 years of age). Pictures of child pornography…

Post has attachment

Post has attachment
Cherry Blossom

WikiLeaks distributes reports from the CherryBlossom venture of the CIA that was produced and executed with the assistance of the US charitable Stanford Research Institute (SRI International). CherryBlossom gives a methods for observing the Internet…

Post has attachment
It's too Hard to Prevent IoT Devices from Threat

The Mirai botnet was in charge of the October 2016 assault that cut down quite a bit of our web. The casualty was Dyn, an organization that gives DNS benefit. Appropriated Denial of Service (DDOS) caused the blackout, and up to 100,000 malevolent…

Post has attachment
Pandemic - This Hacking Tool to Silently Hack Computers Over Network

Today, June 1st 2017, WikiLeaks distributes reports from the “Pandemic” venture of the CIA, a steady embed for Microsoft Windows machines that offer records (programs) with remote clients in a neighborhood arrange. “Pandemic” targets remote clients by…

Post has attachment
Check Point Threat Intelligence and research groups as of late found a high volume Chinese risk operation which has contaminated more than 250 million PCs around the world. The introduced malware, Fireball, assumes control target programs and transforms…
Wait while more posts are being loaded