Image:Group-IB A cybercrime group operating since mid-2019 has breached the email accounts of high-ranking executives at more than 150 companies, …
Runtime Mobile Security (RMS) – A Powerful Web Interface That Helps You To Manipulate Android Java Classes And Methods At Runtime
Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android Java Classes …
How to Verify Individual Identity in the Digital Market?
For the majority of the people, the subject of identity verification is something that doesn’t come up in daily conversations, …
Estonia: Foreign hackers breached local email provider for targeted attacks
Image: Nikola Johnny Mirkovic Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and …
Is Zoom Safe to Use?
With the majority of the world has been in quarantine and self-isolation for over a month now, by now, we’ve …
How to Spot an Online Scam?
With the advent of ‘smart’ devices, which includes everything from self-driving cars, smart assistants such as Amazon’s Alexa to smart …
Terrier – A Image And Container Analysis Tool To Identify And Verify The Presence Of Specific Files According To Their Hashes
Terrier is a Image and Container analysis tool that can be used to scan OCI images and Containers to identify …
PhantomLance spying campaign breaches Google Play security
Kaspersky has warned of an ongoing campaign in which malicious apps hosted by Google Play are covertly spying and stealing …
DeathRansom – A Ransomware Developed In Python, With Bypass Technics, For Educational Purposes
What is a ransomware?A ransomware is malware that encrypts all your files and shows a ransom request, which tells you …
Israel government tells water treatment companies to change passwords
Image: DengdaiFengQi The Israeli government says that hackers have targeted its water supply and treatment facilities last week. In a …