Methodologies for Penetration Testing
These days cyber attacks occur not only in large companies but also in small businesses in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, India etc accordingRead More →
Data Security News | Infosec Blog | Information Security Tutorials
These days cyber attacks occur not only in large companies but also in small businesses in countries like Mexico, Brazil, United States, Colombia, Costa Rica, Argentina, UAE, India etc accordingRead More →
Flaw allowed anyone to edit & take control over .as domains. A British security researcher that goes online only by the name of InfoSec Guy revealed today that American Samoa domainRead More →
Yesterday, a new ransomware called TrueCrypter was discovered by AVG malware analyst Jakub Kroustek. This ransomware encrypts your data using AES-256 encryption and then demands either .2 bitcoins or $115 USD inRead More →
Recently we observed an Android malware family being used to attack users in Russia. The malware samples were mainly distributed through a series of malicious subdomains registered under a legitimateRead More →
Unknown group attacked South East Asian targets, sometimes for years at a time. Microsoft’s Windows Defender Advanced Threat Hunting team works to track down and identify hacking groups that perpetrate attacks. TheRead More →
A list containing hundreds of Spotify account credentials – including emails, usernames, passwords, account type and other details – has popped up on the website Pastebin, in what appears to beRead More →
This is a hardware True Random Number Generator that attaches via USB. Version 0.3 This one uses the better noise source coupled with an op amp that provides 2MHz ofRead More →
Windows comes with a tool called the Windows Management Instrumentation, or WMI, that can be used by system administrators to receive information and notifications from Windows. Using WMI, an administratorRead More →
The hackers behind a large-scale Bangladesh bank hack went further than simply stealing money. Now it turns out that they created malware that could compromise the internationally used SWIFT paymentRead More →
The Defense Advanced Research Projects Agency is calling for the development of a hacker-proof encryption App for the U.S. military. The US Defense Advanced Research Projects Agency (DARPA) is calling securityRead More →