Today the Department of Justice of the United States said that they had arrested hundreds of criminals during a global …
Prerequisites of IoT Security: Software, Network, Physical
IoT Security focuses on protecting networks and connected devices in the Internet of Things. For the readers who are new …
SocialPath – Track users across Social Media Platforms
SocialPath is a django application for gathering social media intelligence on specific username. It checks for Twitter, Instagram, Facebook, Reddit …
Checking for Malware on Your iPad
If you own a jailbreak-free iPad, you have the assurance that your device is virus-free. Moreover, you’re safe from any …
DeTTecT – Detect Tactics, Techniques & Combat Threats
DeTT&CT aims to assist blue teams using ATT&CK to score and compare data log source quality, visibility coverage, detection coverage …
What is the Future of Cybersecurity?
We all know of the exponential growth of cybercrimes. The question now is, how do we stay ahead of a …
Why Use a Content Delivery Network (CDN)?
A Content Delivery Network (CDN) is a collection of interconnected computers that provide web content quickly to different users. It …
TheTick – A simple embedded Linux backdoor
A simple embedded Linux backdoor. Compiling The Tick depends only on libcurl, so make sure you have the corresponding development …
CATPHISH – Phishing and Corporate Espionage
CATPHISH is a tool to generate similar-looking domains for phishing attacks. The program will check expired domains and if they …
Singaporean Unlawful Mining Indicted in the United States
A citizen of Singapore was arrested in the United States for a large-scale mining operation using robbed identity and credit …