Proof of Work
Introduction to blockchain consensus Blockchain systems are a collection of decentralized nodes that maintain a shared digital ledger. Without a centralized authority, the blockchain network needs some way to determine the “official” version of each block in the blockchain. This is the job of the blockchain’s consensus algorithm, which selects ... Read More
Inside the Lyceum/Hexane malware
The Lyceum/Hexane Cybercrime Group Lyceum and Hexane are two industry designations for an APT group that was discovered in August 2019 and was operating without detection for at least a year and... Go on to the site to read the full article ... Read More
Cybercrime at scale: Dissecting a dark web phishing kit
Introduction to dark web phishing kits The internet is like an iceberg: there is a lot more to it than can be seen from the surface. In addition to the surface web (what can be accessed and indexed... Go on to the site to read the full article ... Read More
Lockphish phishing attack: Capturing Android PINs & iPhone passcodes over https
Introduction to Lockphish Phishing attacks are a common tactic for gaining initial access to a system. If an attacker can convince their target to hand over their login credentials or install and... Go on to the site to read the full article ... Read More
Public-Key Cryptography in Blockchain
How public-key cryptography works Public-key or asymmetric cryptography is one of the two main types of encryption algorithms. Its names come from the fact that it uses two different encryption keys:... Go on to the site to read the full article ... Read More
Hash Functions in Blockchain
Introduction to hash functions Hash functions are one of the most extensively-used cryptographic algorithms in blockchain technology. They are cryptographic (but not encryption) algorithms that are... Go on to the site to read the full article ... Read More
Blockchain Structure
Introduction The blockchain gets its name from its underlying structure. The blockchain is organized as a series of “blocks” that are “chained” together. Understanding blockchain security requires... Go on to the site to read the full article ... Read More
The business value of CompTIA CySA+ employee certification
Introduction The cybersecurity threat landscape is rapidly evolving, and cybercriminals are becoming more sophisticated. Traditional threat detection techniques that rely on signature-based threat... Go on to the site to read the full article ... Read More
10 Most Popular Password Cracking Tools [Updated 2020]
Passwords are the most commonly used method for user authentication. Passwords are so popular because the logic behind them makes sense to people and they’re relatively easy for developers to... Go on to the site to read the full article ... Read More
Zero-day Sophos XG Firewall vulnerability: An exploit guide for pentesters
The Sophos XG Firewall vulnerability The Sophos XG Firewall recently had a publicly-reported zero-day vulnerability. The vulnerability in question was an SQL injection vulnerability that, if... Go on to the site to read the full article ... Read More