How to block TOR in your company and how to unblock TOR
Browsing the Tor network is easier than many might think, although sometimes it is better to restrict access to this kind of resource. In working environments, for example, it willRead More →
Browsing the Tor network is easier than many might think, although sometimes it is better to restrict access to this kind of resource. In working environments, for example, it willRead More →
Attacks on ATMs on the street have evolved in great steps, leaving behind the methods of physical engagement of these machines to reach attacks using technology and advanced hacking capabilities.Read More →
Uploading files is very common on a good percentage of websites around the world. Platforms like LinkedIn or Facebook allow users to upload images, MP3, MP4, PDF files and manyRead More →
Bloodhound is a great visual tool that shows the relationship between multiple Active Directory objects and allows you to quickly evaluate the possibility of compromising relevant information, as well asRead More →
The U.S. Air and Space Forces, in collaboration with the cybersecurity community, announced the launch of the second edition of the hacking event Space Security Challenge: Hack-A-Sat. As the nameRead More →
The adoption of Voice over Internet Protocol (VoIP) technology is becoming broader, allowing organizations to communicate over huge distances and very easily. However, most organizations ignore the potential security flawsRead More →
The use of phishing websites is one of the most common hacking techniques, as it is highly functional for threat actors to collect a lot of information from their targets.Read More →
Cybersecurity specialists reported the finding of multiple zero-day vulnerabilities in the Zoom client for desktop equipment whose successful exploitation would allow malicious hackers to execute arbitrary code on the targetRead More →
Cisco is one of the most important companies in its field worldwide, offering sophisticated tools for telecommunications, system management, and network security. Because of its relevant role in all kindsRead More →
Web browsers are one of the most widely used tools by people around the world, whether or not they have hacking skills or minimal computer skills. However, we may notRead More →