System logs analysis is one of the most useful hacking tasks for researchers and specialists in digital forensics and reverse engineering, so a tool that facilitates this process can be
The term web application firewall (WAF) refers to a set of monitoring tools and filters designed to detect and block network attacks against a specific web application. According to pentesting
In a controversial decision, the U.S. Department of Justice (DOJ) announced that it reached an agreement with three former US intelligence agents, who will pay a millionaire fine due to
Man-in-The-Middle (MiTM) attacks are one of the most popular hacking techniques nowadays, and occur when a third party arbitrarily breaks into an established network session or in a data transfer
A recent security report details the detection of MASQ, a tool that allows threat actors to copy smart devices fingerprints, allowing them to evade any security mechanism for malicious purposes.
A hacking group sponsored by the Chinese government would have managed to copy and use a zero-day exploit for Windows systems originally developed by Equation Group, a specialized hacking team
A group of threat actors allegedly sponsored by a nation state successfully attacked the systems of FireEye, a security company based in California, USA, as confirmed by the company itself
The tension generated by the cyber warfare between the United States, and its allies, and Iran keeps growing. Although some information security specialists consider Iranian hackers to be light years