Hassan Ansari

Ethical Hacker & CyberSecurity Enthusiast.

GuardZoo Malware Attack: Over 450 Middle Eastern Military Personnel Targeted

GuardZoo Malware Attack: Over 450 Middle Eastern Military Personnel Targeted

In recent years, Cybersecurity threats have evolved significantly, with state-sponsored groups and cybercriminal organizations deploying increasingly sophisticated malware to achieve their goals. One such malicious software, dubbed “GuardZoo,” has emerged as a formidable threat, targeting over 450 military personnel across the Middle East. This article delves into the intricacies of GuardZoo, its capabilities, methods of […]

GuardZoo Malware Attack: Over 450 Middle Eastern Military Personnel Targeted Read More »

Ethical hacking series: The Art of Reconnaissance: Tools and Techniques

Ethical Hacking Series [Part 3]: The Art of Reconnaissance: Tools and Techniques

Introduction Today, In this part of the Ethical Hacking Series, we will learn about Reconnaissance.  Reconnaissance is the first step in ethical hacking and penetration testing. It involves gathering as much information as possible about a target before attempting any hacks. That is why it is also known as Information Gathering. It is a research

Ethical Hacking Series [Part 3]: The Art of Reconnaissance: Tools and Techniques Read More »

Install and Use Linkfinder to Find Hidden Links in JavaScript Files

Install and Use Linkfinder to Find Hidden Links in JavaScript Files [2024]

INTRODUCTION In the world of cybersecurity, staying ahead of threats is key. One essential tool for security experts is Linkfinder. But what is Linkfinder, and why is it so important?  Linkfinder helps find hidden links in JavaScript files. These links often lead to sensitive parts of a website. By finding these links, security experts can

Install and Use Linkfinder to Find Hidden Links in JavaScript Files [2024] Read More »

Ethical Hacking series [Part 1]: Installing Kali Linux and Setting Up DVWA on VirtualBox

Ethical Hacking series [Part 1]: Installing Kali Linux and Setting Up DVWA on VirtualBox

Introduction Hey there! Welcome to the Part 1 of our Ethical Hacking Series. Today, I am going to tell you how you can install Kali Linux and setup DVWA on your Windows machine using VirtualBox. Welcome to the first step in your journey from beginner to pro hacker. If you’re here, you’re likely eager to

Ethical Hacking series [Part 1]: Installing Kali Linux and Setting Up DVWA on VirtualBox Read More »

British Columbia Government's Systems Hacked

Hacked!: British Columbia Government Faces Major Hacking Attempt

HIGHLIGHTS: In recent developments, British Columbia’s government has officially confirmed facing a sophisticated hacking attempt to infiltrate its information systems. Premier David Eby, accompanied by Mike Farnworth, B.C.’s solicitor-general and public safety minister, revealed the incidents, labeling them as “sophisticated cybersecurity incidents.” Despite the gravity of the situation, there is presently no evidence suggesting that

Hacked!: British Columbia Government Faces Major Hacking Attempt Read More »

Bluetooth Hacking Made Simple: 5 Tools Uncovered

Bluetooth Hacking Made Simple: 5 Tools Uncovered

Welcome to the world of Bluetooth hacking! In this section, we’ll explore the basics of Bluetooth hacking, where hackers use various techniques to gain unauthorized access to Bluetooth-enabled devices. Bluetooth hacking involves exploiting vulnerabilities in Bluetooth protocols and implementations to intercept data, control devices remotely, or extract sensitive information. Common Bluetooth hacking techniques include Bluejacking,

Bluetooth Hacking Made Simple: 5 Tools Uncovered Read More »

Scroll to Top