Articles

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity, security analysts and experts are trying to make it easier to identify and counteract sophisticated...

Emotet Botnet is Back!

Emotet, one of today's most prominent malware botnets, has come back to life after a period of inactivity of almost four months starting at...

Pentest Tools Framework

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools...

Router Exploitation Framework – RouterSploit

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of various modules that aids penetration testing operations: exploits - modules that...

Analysis of Windows Active Directory environment using BloodHound

This article examines the analysis of a Windows Active Directory environment using BloodHound . BloodHound ( https://github.com/BloodHoundAD/BloodHound ) is a tool for clarifying unintended relationships...

Big Data And Cyber Security

Companies are constantly looking for new ways to protect sensitive business data from hackers, according to a new report from the Institute for Critical...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

NAME: WRECK vulnerabilities threaten millions of IoT devices

Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds...

Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken

The largest hacking competition - the spring Pwn2Own 2021 - has ended. This time it all ended in a...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

5G Vulnerabilities is a Great Risk to Users and smartphone

According to information security researchers from Positive Technologies, some...

Safari bug will be patched (in a year!)

A polish security researcher has just disclosed the details...

SUPERNOVA Backdoor Deployed to SolarWinds Orion via Zero-Day Vulnerability

According to a new notice from the US-CERT Coordination Center, hackers...