Hacking WPA Enterprise with Kali Linux
Admittedly, that’s somewhat of a click-bait blog post title but bear with us, it’s for a good reason. Lots of work goes on behind the scenes of Kali Linux: toolsRead More →
Admittedly, that’s somewhat of a click-bait blog post title but bear with us, it’s for a good reason. Lots of work goes on behind the scenes of Kali Linux: toolsRead More →
Since its first appearances until today and surely in the near future, ransomware’s profitable business continues to grow rapidly, compromising the information of companies and users in order to requestRead More →
Will Dormann, a Vulnerability Analyst for the US-CERT Coordination Center (CERT/CC), is advising Microsoft to continue developing EMET because Windows 10 does not provide the same protection measures, in spiteRead More →
Security researchers from Kaspersky Lab are warning of targeted attacks with InPage zero-day against a number of organizations in Asia. According to experts from Kaspersky Lab, a number of organizations in AsiaRead More →
Let me start with some full disclosure: I pay MailChimp a decent wedge of cash each month to send out newsletters to readers of my personal blog, and I’m quiteRead More →
CAUTIOUS COMPUTER USERS put a piece of tape over their webcam. Truly paranoid ones worry about their devices’ microphones—some even crack open their computers and phones to disable or removeRead More →
This article will focus on teaching analysts on analysing malicious JavaScript code within the HWP files and a walkthrough of how we can analyse .HWP files that was used toRead More →
Stampado is one of the many new ransomware strains we have seen in 2016. Stampado was first seen in the wild in July 2016, as one of the cheapest piecesRead More →
A researcher has released a proof-of-concept exploit for a vulnerability in the Network Time Protocol daemon that could crash a server with a single, malformed packet. The Network Time Foundation’sRead More →
In January, Motherboard reported on the FBI’s “unprecedented” hacking operation, in which the agency, using a single warrant, deployed malware to over one thousand alleged visitors of a dark webRead More →