Search
Monday 23 October 2017
  • :
  • :

Archives post

Environmental Controls and the CISSP

It is quite easy to understand why ensuring a proper level of Environmental Controls plays a major role in the protection of any...

DNSSEC Key Rollover Delayed to Prevent Users Going Offline

The Internet Corporation for Assigned Names and Numbers (ICANN) announced this week that the replacement of the root zone key signing key...

Popular GoKeyboard App Spying on Millions of Android Users

For Android smartphone users, online life is always on the edge as every other day there is a new way with which cybercriminals plan to...

Amazon’s Whole Foods Market Suffers Credit Card Breach In Some Stores

Another day, another data breach. This time Amazon-owned grocery chain has fallen victim to a credit card security breach. Whole Foods...

WebXploiter – An OWASP Top 10 Security scanner

WebXploiter The main purpose of this tool is to help to automate the manual Recon techniques + basic exploitation techniques which we used...

Sagan: analyze logs (syslog/event log/snmptrap/netflow/etc)

What is Sagan? Sagan is an open source (GNU/GPLv2) high performance, real-time log analysis & correlation engine. It is written in C...

CrackMapExec v3.1.5 – A Swiss Army Knife For Pentesting Networks

  CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks....

FBI Director – Terrorists could launch drone attacks very soon

FBI director Christopher Wray warns of terrorists are planning to use drones in attacks, the threat is considered as imminent. This week,...

‘Illusion Gap’ attack method bypasses Windows Defender and executes malware

Researchers have developed an attack method dubbed Illusion Gap for bypassing Windows Defender that will allow avoiding antivirus...

Signal announces private contact discovery to improve users’privacy

Open Whisper Systems announced that it’s working on a new private contact discovery service for its popular communications app Signal....

Hackers Exploiting Microsoft Servers to Mine Monero – Makes $63,000 In 3 Months

Mining cryptocurrencies can be a costly investment as it takes a monstrous amount of computing power, and thus hackers have started using...

Dark-Web Drug Dealer Arrested After He Travelled US for World Beard Championships

United States authorities arrested suspected dark web drug kingpin late last month while he was travelling from his base in France to the...

Κρίσιμο κενό ασφαλείας σε συσκευές με Android και iOS. Αναβαθμίστε άμεσα!

                  Οι συσκευές της Apple θεωρούνται γενικά...

Precious Data: Δύσκολη η ψηφιακή ζωή όσων μοιράζονται δεδομένα

Οι χρήστες θέτουν σε κίνδυνο τα πολύτιμα και ευαίσθητα δεδομένα (Precious Data)...

PowerShdll – Run PowerShell with rundll32 (Bypass software restrictions)

Run PowerShell with dlls only. Does not require access to powershell.exe as it uses powershell automation dlls. dll mode: Usage: rundll32...

radare2 – Unix-Like Reverse Engineering Framework And Commandline Tools

r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with binary files. The radare project...

Internet Explorer: διαρρέει ότι πληκτρολογείτε σε ιστότοπους

Εάν χρησιμοποιείτε τον Internet Explorer της Microsoft αυτήν τη στιγμή, ό, τι...

DDoS Attacks More Likely to Hit Critical Infrastructure Than APTs: Europol

While critical infrastructure has been targeted by sophisticated threat actors, attacks that rely on commonly available and easy-to-use...

Ransomware Attacks ‘Global Epidemic’, Says Europol

An “epidemic” has erupted in global ransomware attacks, taking over computers as well as internet-linked devices like routers...

novahot: A webshell framework for penetration testers

novahot novahot is a webshell framework for penetration testers. It implements a JSON-based API that can communicate with trojans written...

bluebox-ng: VoIP/UC vulnerability scanner

Bluebox-ng DISCLAIMER: Pointing this tool at other people’s servers is NOT legal in most countries. Auto VoIP/UC penetration test...

The Big List of Computer Forensics Certifications

Computer forensics certifications have gained tremendous popularity over the past few years. Many public and private organizations have...

Free & Open Source Computer Forensics Tools

Introduction According to Juniper Research, cybercrime losses to businesses will surpass $2 trillion by the year 2019. With data breaches...

CCleaner Malware: Here is the Full List of Affected Companies

Last week news came out that CCleaner software was infected with a backdoor. An initial investigation showed it was a...

South Korea Blames North Korean Hackers For Stealing Bitcoin

North Korean State-Sponsored Hackers Attacked Four Virtual Currency Exchanges in Seoul- Report Reveals. North Korea is being held...

Google publishes PoC Exploit code for iPhone Wi-Fi Chip hack

Google disclosed details and a proof-of-concept exploit for iPhone Wi-Fi firmware vulnerability affecting Broadcom chipsets in iOS 10 and...

A high-risk two-years old flaw in Linux kernel was just patched

A high-risk security vulnerability discovered more than two years ago has been patched in Linux kernel. The flaw discovered by researchers...

iOS apps can access metadata revealing users’ locations and much more

Developer discovered that iOS apps can read metadata revealing users’ locations and much more, a serious threat to our privacy. The...

ESET: Τα επτά ψηφιακά αμαρτήματα

ESET: Η ψηφιακή τεχνολογία αποκτά όλο και μεγαλύτερη βαρύτητα στις ζωές μας,...

MyEtherWallet Notification – Email scam

A new scam. This time, the hacker tries to steal logging data for the Ethereum wallet. A site identical to the original was created with...