Access denied!! Pay Ransom!! Access denied!!. These words on a computer are a living nightmare for any organization. This indicates …
Digital Signature Hijack – Binaries, PowerShell Scripts And Information About Digital Signature Hijacking
Hijacking legitimate digital signatures is a technique that can be used during red team assessments in order to sign PowerShell …
Avon recovering after mysterious cyber-security incident
Image: kinkate, Avon Cosmetics giant Avon is recovering from a mysterious cyber-security incident that took place last week, on June …
What to look for when buying antispyware software?
Purchasing the spyware program is a very daunting task. Due to the heavy competition in the online market place, the …
Fsociety – A Modular Penetration Testing Framework
Install pip install fsociety Update pip install –upgrade fsociety Usage usage: fsociety [-h] [-i] [-s] A Penetration Testing Framework optional …
South African bank to replace 12m cards after employees stole master key
Postbank, the banking division of South Africa’s Post Office, has lost more than $3.2 million from fraudulent transactions and will …
Axiom – A Dynamic Infrastructure Toolkit For Red Teamers And Bug Bounty Hunters!
Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty and pentesting.Axiom right …
What Is Ransomware? Know All About It
Ransomware is a waking nightmare about locking and encrypting your valuable files by malware. You need to pay off a …
URLCADIZ – A Simple Script To Generate A Hidden Url For Social Engineering
A simple script to generate a hidden url for social engineering.Legal disclaimer:Usage of URLCADIZ for attacking targets without prior mutual …
Lamphone attack lets threat actors recover conversations from your light bulb
In a research paper published this week, academics detailed a novel method of recovering conversations and audio recordings by observing …