Articles

Emotet Botnet is Back!

Emotet, one of today's most prominent malware botnets, has come back to life after a period of inactivity of almost four months starting at...

Pentest Tools Framework

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools...

Router Exploitation Framework – RouterSploit

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of various modules that aids penetration testing operations: exploits - modules that...

Analysis of Windows Active Directory environment using BloodHound

This article examines the analysis of a Windows Active Directory environment using BloodHound . BloodHound ( https://github.com/BloodHoundAD/BloodHound ) is a tool for clarifying unintended relationships...

Big Data And Cyber Security

Companies are constantly looking for new ways to protect sensitive business data from hackers, according to a new report from the Institute for Critical...

Latest news

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Vulnerability in macOS Leads to Data Leakage

Microsoft experts said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and...

Microsoft Defender Log4j Problem Scanner finds non-existent bugs

The media reports that Microsoft Defender for Endpoint is showing false warnings about some kind of "sensor tampering" associated...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

FireEye was attacked by government hackers

One of the world's largest security vendors, FireEye, says it has...

Haron ransomware is similar to the well-known threats of Thanos and Avaddon

Analysts from the South Korean company S2W Labs have discovered...

Due to a bug, Kaspersky Password Manager allowed generating weak passwords

Last year, the developers of Kaspersky Password Manager (KPM)...