Articles
Network Vulnerability Assessment ? Why Should Every Company Do it at least once a Year !
Network vulnerability assessment analyzes a variety of network issues, prioritizes the most important (such as network security, network integrity, and network performance), and then...
Artificial Intelligence
Machine Learning in Malware Analysis
Many different deep network architectures have been suggested by machine learning experts and malware analysts to detect both known and unknown malware. There has...
Tutorial and Tools
SocialFish – Let’s Go Phishing
SocialFish is an open-source phishing tool, integrated with another open source tool – Ngrok, which allows you to easily create a phishing page of most...
Artificial Intelligence
Automation Of Penetration Testing With Machine Learning
Penetration Testing in Simple Words, is to identify and indicate a vulnerability and perform set of actions to test if the Target is Exploitable...
Tutorial and Tools
Astsu – A network scanner tool
A network scanner tool, developed in Python 3 using scapy.
How it works
Scan common ports: Send a TCP Syn packet to the destination on the...
Attacks & Breaches
Elasticsearch Data Breach – Genealogy Software Maker Exposes Data on 60,000 Users
A US tech company that manages popular family tree software has exposed tens of thousands of its users’ personal information online via a misconfigured...
Artificial Intelligence
Artificial Intelligence and Cyber Security
As artificial intelligence intrudes into the world of cybersecurity, security analysts and experts are trying to make it easier to identify and counteract sophisticated...
Malwares & Botnets
Emotet Botnet is Back!
Emotet, one of today's most prominent malware botnets, has come back to life after a period of inactivity of almost four months starting at...