About Thoron Framework Thoron Framework is a Linux post-exploitation framework that exploit Linux tcp vulnerability to get shell-like connection. Thoron …
What is Product Strategy and How Do You Develop One?
A product strategy is a key contributor to the success of any product. It serves as a guide for all …
Netflix and Chill. How to Choose a TV for Home Cinema
Over the past five years, home cinemas have gained immense popularity – mainly due to the fall in prices for …
Spear-phishing campaign compromises executives at 150+ companies
Image:Group-IB A cybercrime group operating since mid-2019 has breached the email accounts of high-ranking executives at more than 150 companies, …
Runtime Mobile Security (RMS) – A Powerful Web Interface That Helps You To Manipulate Android Java Classes And Methods At Runtime
Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android Java Classes …
How to Verify Individual Identity in the Digital Market?
For the majority of the people, the subject of identity verification is something that doesn’t come up in daily conversations, …
Estonia: Foreign hackers breached local email provider for targeted attacks
Image: Nikola Johnny Mirkovic Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and …
Is Zoom Safe to Use?
With the majority of the world has been in quarantine and self-isolation for over a month now, by now, we’ve …
How to Spot an Online Scam?
With the advent of ‘smart’ devices, which includes everything from self-driving cars, smart assistants such as Amazon’s Alexa to smart …
Terrier – A Image And Container Analysis Tool To Identify And Verify The Presence Of Specific Files According To Their Hashes
Terrier is a Image and Container analysis tool that can be used to scan OCI images and Containers to identify …