Most recent articles by:

Koohyar Biniyaz (Jimmy)

Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !

Network vulnerability assessment analyzes a variety of network issues, prioritizes the most important (such as network security, network integrity, and network performance), and then...

Machine Learning in Malware Analysis

Many different deep network architectures have been suggested by machine learning experts and malware analysts to detect both known and unknown malware. There has...

SocialFish – Let’s Go Phishing

SocialFish is an open-source phishing tool, integrated with another open source tool – Ngrok, which allows you to easily create a phishing page of most...

Automation Of Penetration Testing With Machine Learning

Penetration Testing in Simple Words, is to identify and indicate a vulnerability and perform set of actions to test if the Target is Exploitable...

Astsu – A network scanner tool

A network scanner tool, developed in Python 3 using scapy. How it works Scan common ports: Send a TCP Syn packet to the destination on the...

Elasticsearch Data Breach – Genealogy Software Maker Exposes Data on 60,000 Users

A US tech company that manages popular family tree software has exposed tens of thousands of its users’ personal information online via a misconfigured...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity, security analysts and experts are trying to make it easier to identify and counteract sophisticated...

Emotet Botnet is Back!

Emotet, one of today's most prominent malware botnets, has come back to life after a period of inactivity of almost four months starting at...