Pakistan Army Website Hacked by Afghani Hackers

pak-army-web-hacked Afghan Cyber Army has hacked the Pakistan Army official Site and leaked its database to the public. The deface page contains hatred text and broken English language seemingly convinced as they were Afghans. Recently,  Afghan Cyber Army hacked 34 Pakistani websites. Hacked Site: Here is the Message from hackers: TARGET : WWW.PAKISTANARMY.GOV.PK We Are : […] Continue reading →

Jammu & Kashmir State Road Transport Co-operation Site Hacked by ZHC

Afzal guru by ZHC ZCOMPANY HACKING CREW hacked and defaced the website of Jammu & Kashmir State Road Transport Co-operation, in response to the Shaheed Afzal Guru. The site is still defaced at the time of writing this. Deface Page: Hacked Site: Mirror: Deface Message:  HACKED BY ZCOMPANY HACKING CREW Congratulations India!! But wait!; Think again! Salute […] Continue reading →

US Enegery department under Cyber Attack

US department of energy The Energy Department has been under massive cyber-attacks, as a result information of its hundreds of employees has been stolen, the officials are not positive over theft of secret information, According to report. The FBI is now investigating the attack in which hackers penetrated into 20 workstations and about 14 computer servers in the Washington […] Continue reading →

PKNIC hacked by Pakbugs

PKNIC hacked by pakbugs PKNIC hacked by the hacker group Pakbugs, hijacked Top Media Sites Jang News, Express News, The News and ProPakistani. Yesterday, Pakbugs hijacked as a revenge. PKNIC - .pk domain name registrar in the Pakistan has been hacked by Pakbugs. Hackers claimed to dump the database with 23,000 PKNIC users and their domains. Hackers just targeted […] Continue reading →

Adobe Vulnerable to XSS flaw

adobe vulnerable to XSS One of the subdomain ( of Abode site is vulnerable to XSS. The vulnerability is still not fixed by Adobe. Ethical hackers reported vulnerability a few days ago but they failed to respond. We got email from Ethical Indians. Since the Bug Bounty Program started by companies, hackers are continually hunting different types of vulnerabilities of different […] Continue reading →