If you own a jailbreak-free iPad, you have the assurance that your device is virus-free. Moreover, you’re safe from any …
DeTTecT – Detect Tactics, Techniques & Combat Threats
DeTT&CT aims to assist blue teams using ATT&CK to score and compare data log source quality, visibility coverage, detection coverage …
What is the Future of Cybersecurity?
We all know of the exponential growth of cybercrimes. The question now is, how do we stay ahead of a …
Why Use a Content Delivery Network (CDN)?
A Content Delivery Network (CDN) is a collection of interconnected computers that provide web content quickly to different users. It …
TheTick – A simple embedded Linux backdoor
A simple embedded Linux backdoor. Compiling The Tick depends only on libcurl, so make sure you have the corresponding development …
CATPHISH – Phishing and Corporate Espionage
CATPHISH is a tool to generate similar-looking domains for phishing attacks. The program will check expired domains and if they …
Singaporean Unlawful Mining Indicted in the United States
A citizen of Singapore was arrested in the United States for a large-scale mining operation using robbed identity and credit …
Patches for Internet Explorer Zero-Day Causing Problems for Many Users
Microsoft released a new series of security patches in Internet Explorer for a zero-day bug, originally addressed on September 23. …

ConPtyShell – Fully Interactive Reverse Shell for Windows
ConPtyShell is a Fully Interactive Reverse Shell for Windows systems. The introduction of the Pseudo Console (ConPty) in Windows has …
Watson – Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities. My focus …