ReconDog v2.0
Reconnaissance Swiss army knife Main Features Wizard and CLA interface You can extract targets from STDIN (channeled input) and act on them According to specialists in digital forensics from the International InstituteRead More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
Reconnaissance Swiss army knife Main Features Wizard and CLA interface You can extract targets from STDIN (channeled input) and act on them According to specialists in digital forensics from the International InstituteRead More →
Data belonging to millions of passengers is compromised Digital forensics experts from the International Institute of Cyber Security report that one of Asia’s major airlines has just discovered that itRead More →
The flaw, still unpatched, allows an attacker to delete any type of file on a machine, including system data A cybersecurity and digital forensics researcher has published a proof-of-concept forRead More →
Payment card information of more than 180k people could have been stolen Details on a second cyberattack incident against British Airways airline have been recently disclosed. According to experts in digital forensics,Read More →
Russian hackers would have launched the Triton malware campaign against various facilities in Saudi Arabia A few days ago experts in digital forensics reported the existence of a new malwarecalled GreyEnergy,Read More →
After the insurance firm suffered a cyberattack, the Mexico central bank raised the security alert level in the operation of its payment systems Experts in digital forensics from the InternationalRead More →
The car was stolen in Essex using a relay technique During the early hours of last Sunday morning, two masked cybercriminals began to maraud around a Tesla Model S onRead More →
Tracking and analysis on Twitter Experts in digital forensics introduce Twitter Intelligence, open source intelligence (OSINT) project written in Python to carry out Twitter tracking and analysis tasks without using the TwitterRead More →
The operating system ignores requesting user confirmation to overwrite existing files in a location The Windows 10 updates launched in October 2018, also known as Build 1809, has presented countless errors sinceRead More →
According to experts, many municipalities attacked with ransomware do not have many options when facing such an incident The city of West Haven, Connecticut, made the difficult decision to payRead More →
This government institution is opting to work with ethical hackers and their researches to protect vulnerable medical devices The work of malicious hackers has become a latent concern in today’sRead More →
Chinese government asks to register users’ real names, posts censorship and store user data People in China will need to register their real names before they can use any blockchain-based onlineRead More →
Only 6% of the comments received were legitimately sent New York Attorney General Barbara Underwood subpoenaed 14 companies and organizations as part of a state research on the surge ofRead More →
Data collection and exchange through mobile applications are out of control, experts warn A research conducted by cybersecurity and digital forensics specialists estimates that almost 90% of the free appsRead More →
Different ways of exploiting the flaw have been widely spread too Out of the thousands of plugins for the jQuery framework, one of the most popular has hosted for at least threeRead More →
Attackers target critical servers using three of the NSA-developed hacking tools, including DarkPulsar, which were leaked by the Shadow Brokers hacking group According to reports of experts in digital forensics,Read More →
The implementation of e-voting has generated both advantages and technological risks Technology provides us countless comforts, but it also cements the way for scammers and cybercriminals to take advantage ofRead More →
This library is used by popular media players, along with a series of integrated devices with streaming capacities Cybersecurity and digital forensics researchers report the finding of a critical remoteRead More →
How to know if your account was hacked and what user information the hackers got After the massive data theft that compromised the information of tens of millions of accounts, Facebook beganRead More →
These are the most common ways a cybercriminal can compromise a connected car Opening a car without needing to use a key may seem very convenient, but experts in digitalRead More →