Writing Exploits for Win32 Systems from Scratch
This post is aimed at those new to exploit development and wanting to understand the end-to-end process and types of techniques that need to be employed in order to realiseRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
This post is aimed at those new to exploit development and wanting to understand the end-to-end process and types of techniques that need to be employed in order to realiseRead More →
Short Bytes: Teardrop attack is a type of Denial of Service (DoS) attack which exploits the fragment offset field in the IP header to produce buggy fragments which are then deliveredRead More →
Criminals infected over 200 US businesses with PunkeyPOS. Security researchers from PandaLabs have hacked their way into the administration panel of the PunkeyPOS point-of-sale malware and have discovered an ongoing campaignRead More →
Here at Integrity we love to be challenged, so whenever there is some free time, there is encouragement to do research or to break some things (https://labs.integrity.pt/advisories/) in addition toRead More →
The central banks of Indonesia and South Korea have been hit by distributed denial of service attacks on their public websites, with officials linking the timing of the attacks toRead More →
In an effort to develop a target base and increase the conversion rate of victims, ransomware perpetrators will try to veer away from well-known families and create new family sportingRead More →
OurMine, the same group that hacked Mark Zuckberg’s Pinterest and Twitter accounts, seems to be behind it. Even the former CEO of Twitter isn’t protected from the occasional security hack.Read More →
An unnamed hacker hacked the video conferencing software used by the Quebec Liberal Party and shared the news with the media. Politicians are a privileged target of hackers, in manyRead More →
The employee tried to cash in by stealing and selling the data of up to 1.5 million Czech customers. T-Mobile’s arm in the Czech Republic has uncovered an employee’s intentionsRead More →
Incident seems to be another ATO (account takeover) attack.GoToMyPC decided to reset user passwords after attackers tried to hack into customer accounts over the weekend using what the company callsRead More →