Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight

Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
We are living in an era where malware is part of our daily lives. Emergent campaigns are increasing, each more sophisticated and harder to detect than the last. Malware can reveal itself through different abnormal behaviors, including a giant wave of annoying ads flooding your screen, your system crashing, blocks ... Read More
How to create a subdomain enumeration toolkit

How to create a subdomain enumeration toolkit

| | General Security
Introduction A domain name is an important part of the reconnaissance process during a security assessment or even for many bug bounty challenges. In this article, we’ll look at how a domain can be classified. Within this context, two scenarios of how to take advantage of domain misconfigurations will be ... Read More
Using Merlin agents to evade detection

Using Merlin agents to evade detection

| | Penetration Testing
Introduction While penetration testing and Red Teaming are crucial to check a system’s security and to validate potential entry-points in the infrastructure, sometimes establishing an initial foothold on the target can be a big challenge due to host IDS agents, host firewalls, antivirus or even due to bypass security appliances ... Read More
Fuzzing introduction: Definition, types and tools for cybersecurity pros

Fuzzing introduction: Definition, types and tools for cybersecurity pros

| | ethical hacking
Fuzzing is a black-box software testing technique and consists of finding implementation flaws and bugs by using malformed/semi-malformed payloads via automation. Fuzzing an application is not a... Go on to the site to read the full article ... Read More
Hacking Microsoft Teams vulnerabilities: A step-by-step guide

Hacking Microsoft Teams vulnerabilities: A step-by-step guide

| | Hacking
Introduction We are living in an era where technology is part of our lives and a primary valuable resource for personal and professional tasks. The use of online videoconference platforms such as... Go on to the site to read the full article ... Read More
LockBit malware: What it is, how it works and how to prevent it | Malware spotlight

LockBit malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction LockBit is a data encryption malware in operation since September 2019 and a recent Ransomware-as-a-Service (RaaS), in which developers are in charge of the payment site and development... Go on to the site to read the full article ... Read More

Ransomware deletion methods and the canary in the coal mine

| | Malware Analysis
Introduction  Ransomware is an emergent threat. Every week, there is a new and notable outbreak of this class of data encryption malware. From Ragnar Locker to Netwalker, the threats are increasing,... Go on to the site to read the full article ... Read More

Bypassing security products via DNS data exfiltration

| | dns
Introduction Criminals are using different strategies to compromise computer networks, infrastructures and organizations. Cyber incidents have increased in number and complexity since the... Go on to the site to read the full article ... Read More
Netwalker malware: What it is, how it works and how to prevent it | Malware spotlight

Netwalker malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction Netwalker is a data encryption malware that represents an evolution of the well-known Kokoklock ransomware and has been active since September 2019. This article will detail the specific... Go on to the site to read the full article ... Read More
Ragnar Locker malware: what it is, how it works and how to prevent it | Malware spotlight

Ragnar Locker malware: what it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction The popularity of ransomware threats does not appear to be decreasing. Instead, more and sophisticated ransomware threats are being deployed. Ragnar Locker is a new data encryption... Go on to the site to read the full article ... Read More
Loading...