You must have heard about cyber attackers who kidnap your data to extort money. This malicious software or ransomware locks …
Vhosts-Sieve – Searching For Virtual Hosts Among Non-Resolvable Domains
Searching for virtual hosts among non-resolvable domains.Installation git clone https://github.com/dariusztytko/vhosts-sieve.git pip3 install -r vhosts-sieve/requirements.txt UsageGet a list of subdomains (e.g. …
Russia unbans Telegram
The Russian government has lifted its largely ineffective two-year-old ban on the Telegram instant messaging service. In a message posted …
Top 5 Phishing Protection Solutions for 2020
A phishing email is one of the very first phases of a phishing attack. It is easy to deploy and …
The Best Drones for College Students
If you’re a student and would like to purchase a drone on a limited budget, there is a wide variety …
SGN – Encoder Ported Into Go With Several Improvements
SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a …
AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever
Image: Amazon Amazon said its AWS Shield service mitigated the largest DDoS attack ever recorded, stopping a 2.3 Tbps attack …
How To Get Rid Of Ransomware?
Access denied!! Pay Ransom!! Access denied!!. These words on a computer are a living nightmare for any organization. This indicates …
Digital Signature Hijack – Binaries, PowerShell Scripts And Information About Digital Signature Hijacking
Hijacking legitimate digital signatures is a technique that can be used during red team assessments in order to sign PowerShell …
Avon recovering after mysterious cyber-security incident
Image: kinkate, Avon Cosmetics giant Avon is recovering from a mysterious cyber-security incident that took place last week, on June …