Articles

Analysis of Windows Active Directory environment using BloodHound

This article examines the analysis of a Windows Active Directory environment using BloodHound . BloodHound ( https://github.com/BloodHoundAD/BloodHound ) is a tool for clarifying unintended relationships...

Big Data And Cyber Security

Companies are constantly looking for new ways to protect sensitive business data from hackers, according to a new report from the Institute for Critical...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

Pareto botnet claims jailbroken devices are TVs

Experts from Human Security (formerly White Ops) have discovered the Pareto botnet that infects Android devices and uses them to scam...

Vulnerable Microsoft Exchange Servers Attacked by Prometei Botnet

Since the patches for ProxyLogon problems were still not fully installed, attackers continue to attack vulnerable Microsoft Exchange servers. Now researchers from Cybereason Nocturnus have discovered the Prometei botnet, which mines Monero cryptocurrency on vulnerable machines.

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Popular The Great Suspender Chrome Extension Contains Malware

The Great Suspender extension has been removed from the...

Vulnerability in WordPress plugin exploited to reset admin passwords

Last week, the popular Easy WP SMTP  plugin  for WordPress, installed on...