5 Steps for Secure Malware Analysis

5 Steps for Secure Malware Analysis

Avoid common pitfalls of malware analysis that could put you or your organization at risk with these 5 steps ... Read More
vBulletin 5: 0day from Imperfect Patch

vBulletin 5: 0day from Imperfect Patch

Popular forum software platform vBulletin faced a brand new remote code execution 0day vulnerability - the culprit: an imperfect patch ... Read More
Guide: 21 OSINT Tools for Threat Intelligence

Guide: 21 OSINT Tools for Threat Intelligence

A new quick guide, '21 OSINT Tools for Threat Intelligence', introduces the favorite tools and services of open source intelligence researchers and analysts ... Read More
Elliot using DeepSound on Mr. Robot

Hollywood Hacks & Hackers

|
Hollywood’s take on cybersecurity and hacking, on the big screen and in TV dramas or on Netflix, oscillates between mystifying and hilarious. A closer look ... Read More
How to Detect Browser Extensions

How to Detect Browser Extensions

Is it possible to detect what browser extensions I have installed? How unsafe and 'oversharing' addons give online attackers, unethical online marketers and snoops a leg up ... Read More
ioc2rpz demo video

10 Top Tools for Threat Hunters from Black Hat USA 2019

Ten short reviews of useful tools for OSINT analysts and threat hunters presented at Black Hat USA 2018 for pentesting, forensics, online investigations, phishing simulation, and more ... Read More
ActiveX Data Leaks: Making Bad (Non-) Browsers Worse

ActiveX Data Leaks: Making Bad (Non-) Browsers Worse

ActiveX, in combination with locally installed browsers and plugins, still poses a potent threat for enterprise cybersecurity. An overview ... Read More
How Watering Hole Attacks Target the Financial Sector and Government Agencies

How Watering Hole Attacks Target the Financial Sector and Government Agencies

Websites of governments, regulatory bodies and financial authorities are preferred targets for "watering hole" attacks on finance, investment and compliance professionals. These online resources make it easy for attackers to target their victims. How do such attacks work? * Source: GoldPhish So-called watering hole (a.ka. "water holing") attacks are probably ... Read More
VPN & Privacy: What Nobody Told You

VPN & Privacy: What Nobody Told You

Large-scale privacy violations on the web have become commonplace. Social media platforms and app or service providers have been shelling out, some intentionally, others unintentionally, user data to third parties hand over fist. While such incidents may have a numbing effect on some users, others take them as a reminder ... Read More
Quick Dissections: Collections 2 - 5

Quick Dissections: Collections 2 – 5

You’ve seen the headlines about a loot archive of stolen credentials called "Collection #1" that was leaked online in January. This collection contains 772,904,991 entries, one of the most significant credential leaks yet. The credentials are all stored within an email:cleartext_password format, making credential stuffing ... Read More