Skip to the content
Tech Fizz
  • Home
  • Courses
  • Dashboard
  • Register
    • Student Registration
    • Instructor Registration
  • Blogs
  • My account
  • Contact us
  • Privacy Policy
  • Home
  • Courses
  • Dashboard
  • Register
    • Student Registration
    • Instructor Registration
  • Blogs
  • My account
  • Contact us
  • Privacy Policy

Axi Infinity, Ronin Network Lost $625 Million in Hack Attack, Ether and USD Coin Theft

  • Posted on March 30, 2022March 30, 2022

Axi Infinity, Ronin Network Lost $625 Million in Hack Attack, Ether and USD Coin Theft

Every day something new happens in the world of hacking, you all must know how dangerous hacking is, a new case of hacking has come to the fore. Identified when a user could not withdraw Ether tokens from Ronin

Read More

  • Posted on November 25, 2021

TODAYZOO PHISHING KIT USED TO SWIPE MICROSOFT CREDENTIALS » TechNoCP

[ad_1] Microsoft has detailed an unusual phishing campaign aimed at stealing passwords that uses a phishing kit built using pieces of code copied from other hackers’ work. A “phishing kit” is the various software or

Read More

  • Posted on November 25, 2021

Information Gathering – First Step Of Hacking » TechNoCP

[ad_1] Hi Hackies, “Information is power,” as the saying goes. And in most scenarios it’s true: having critical information, at the right time, and especially knowing how to use it, can be a great source of power.

Read More

  • Posted on November 25, 2021

Sensitive data of 400,000 German students exposed by API flaw » TechNoCP

[ad_1] Approximately 400,000 users of Scoolio, a student community app widely used in Germany, had sensitive information exposed due to an API flaw in the platform. Lilith Wittmann, a security researcher from the IT

Read More

  • Posted on November 25, 2021

Wireless Hacking Basic Knowledge » TechNoCP

[ad_1] Hi Hackies, Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and

Read More

  • Posted on November 25, 2021

How Hackers Leak Databases » TechNoCP

[ad_1] Hi Hackies, Hackers Use Sql Injection Vulnerablity To Dump A Databases. SQL injection is currently the most common form of web site attack in that web forms are very common, often they are not coded properly

Read More

  • Posted on November 25, 2021

How Do Hackers Hijack Websites And Browser Using Xss » TechNoCP

[ad_1] Hi Hackies, Today I am going to introduce the most common attack used by hackers ‘XSS Vulnerability’. This attack also known as ‘XSS attack’.This is use to hack a website.This is a type of injection attack

Read More

  • Posted on November 25, 2021

How Do Hackers Upload Shellcodes Using LFI » TechNoCP

[ad_1] Hi Hackies, Today I am going to introduce a new thing “LFI(Local File Inclusion)”. I explain all about LFI ( How does it work and how to secure and many more.) LFI is listed as one of the OWASP Top 10 web

Read More

  • Posted on November 25, 2021

Windows Privilege Escalation: Insecure GUI Application

[ad_1] Introduction In the series of Privilege escalation, till now we have learned that Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components

Read More

  • 1
  • 2
  • 3
  • …
  • 17
  • Find the Substring in Python
    How to find the substring in Python String
  • YAMAHA E01electric
    Yamaha Introduces New Electric Scooters
  • kgf-2 update: 500 Crore Business So Far
  • Hero-Splendor-Electric-Conversion-Kit-2
    Make Hero Splendor Electric with GoGo A1
  • kgf2
    KGF-2 created history, earned 54 crores in Hindi
  • Even Before Its Release, ‘kgf 2’ Made A Record
  • kgf2
    KGF 2: How much money did Sanjay Dutt and Raveena-Srinidhi charge for their roles?

Categories

  • App Development (5)
  • Apps Development (2)
  • artificial intelligence (2)
  • Backend Development (11)
  • BLOGGING (12)
  • Books (6)
  • Cheatsheets (1)
  • Coding (49)
  • Corporate Business (2)
  • Courses (5)
  • CRYPTOGRAPHY (2)
  • CYBER SECURITY (168)
    • Fresh News (7)
  • Digital Marketing (1)
  • DSA Questions (7)
  • EDUCATION (7)
  • Education & Career (56)
  • ENTERTAINMENT (13)
  • ETHICAL HACKING (150)
  • FACEBOOK HACK (8)
  • FINANCE (3)
  • FREE HACKING COURSE (24)
  • Fresh News (6)
  • Frontend Development (12)
  • Game Development (4)
  • GOV. SCHEMES (8)
  • Graphics Design (1)
  • Hacking (9)
  • HACKING BOOKS (5)
  • HACKING TOOLS (19)
  • HTML (7)
  • Javascript (14)
  • LATEST HACKS (8)
  • LAW (3)
  • Machine Learning (7)
  • MCQ (3)
  • Merch (1)
  • Money (7)
  • NETWORK SECURITY (14)
  • Node JS (6)
  • programming (71)
    • C Language (9)
    • C++ (20)
    • DBMS (11)
    • python (27)
  • Projects (22)
  • Questions (12)
  • QUIZ (5)
  • SEO Optimization (1)
  • Technology (84)
  • Uncategorized (3)
  • Vs Code (5)
  • Web Development (19)
  • Wordpress (2)

Contact

techfizzin@gmail.com

Follow us on

Quick Links

  • Home
  • Courses
  • Dashboard
  • Student Registration
  • Instructor Registration

Top Courses

  • Internet of Things – 7th Semester : Rajasthan Technical University | Bikaner Technical University – Full Course (7CS4-01)
  • Big Data Analytics – 8th Semester : Rajasthan Technical University | Bikaner Technical University – Full Course (8CS4-01)

Popular Categories

  • CYBER SECURITY
  • ETHICAL HACKING
  • Technology
  • Coding
  • Python
  • C++
  • Contact us
Tech Fizz. All Rights Reserved.