How to benefit your organization from white hat hackers
Hackers are a huge threat to organizations, so ethically practiced hacking is often the best way to protect them from these attacks. The nature of the attacks on computerRead More →
Hackers are a huge threat to organizations, so ethically practiced hacking is often the best way to protect them from these attacks. The nature of the attacks on computerRead More →
Just take 15 seconds to break into a network and lay the way for an attacker. It turns out that botnets might be an easier way to break into aRead More →
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat. This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is notRead More →
There can never be too many IoT gadgets – that’s what people usually think when buying yet another connected device with advanced functionality. From our perspective, we also think there can’t beRead More →
Talos has identified a targeted attacks affecting the Middle East. This campaign contains the following elements, which are described in detail in this article. The use of allegedly confidential decoyRead More →
This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information forRead More →
The Sednit group — also known as Strontium, APT28, Fancy Bear or Sofacy — is a group of attackers operating since 2004, if not earlier, and whose main objective is to stealRead More →
Like good old Microsoft Office Macros, Compiled HTML (CHM) Help files have been utilized by malware authors for more than a decade to sneak malicious downloader code into files makingRead More →
Mandiant recently responded to an incident at a critical infrastructure organization where an attacker deployed malware designed to manipulate industrial safety systems. The targeted systems provided emergency shutdown capability for industrialRead More →
Group-IB has uncovered a hacker group attacking banks in the USA and Russia. In less than two years, this group has conducted over 20 successful attacks on financial institutions andRead More →