SharpHide Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null-terminated) registry key. This...
A new wave of malware attack strikes again from the Titanium APT group that infects windows with hidden backdoor by mimicking common...
FOCA (Fingerprinting Organizations with Collected Archives)FOCA is a tool used mainly to find metadata and hidden information in the documents it...
The latest Android version has been out for more than a week now, and many of us are working hard to find...
Our digital lives connect massive things with the Internet. Starting with Smartphones, Wi-Fi routers, Surveillance Camera, Smart TV, SCADA networks and leading...
To tackle uninvited burglars and other intrusions, many people resort to installing closed-circuit TV cameras in their homes. But the problem with...
Phishing is what mostly victims fall into trap of fake pages. There are many of methods for creating fake pages. Phishing is...
Ultimate Phishing tool with android support available comes with 34 attack vectors of the most popular used services. Hidden Eye Modern Phishing...
Wimbledon is coming to an end this weekend. To mark the occasion, Google is offering a new Easter Egg in the form...
An investigation conducted by system audit specialists from the security firm Check Point has revealed the existence of new smartphone malware; dubbed...
Facebook suffered a massive outage in its suite of apps yesterday morning; According to website security audit specialists, this flaw provided social...
This is a copy of the source for the http://zlal32teyptf4tvi.onion hidden service, which implements a tor hidden service crawler / spider and...
A new sophisticated, unique Linux malware dubbed HiddenWasp used in targeted attacks against victim’s who are already under attack or gone through...
Although they are not uncommon, network security specialists mention that the security risks present in Linux systems are not known broadly enough....
Unlike the Windows cybersecurity ecosystem, the threats concerning the Linux systems aren’t often discussed in much detail. The attacks either go undetected...
While detecting malicious software hidden in hardware parts is an incredibly complex task, cyber forensics course specialists believe that important steps are...
Google receives tonnes of requests from copyright holders daily for removing infringing content. The company then analyzes the received requests and removes the content that violates copyright claims....
Google has released the first beta of the upcoming Android Q, and people are frantically searching for new features in the OS....
Core dumps or memory dumps are created when program is executed. A dump consists of modules or work flow that how program...
Security measures are not the only ones seeing improvements! Malicious apps are also figuring out new ways to enhance its working, and one...
Information gathering is not an easy task. In many phases, pentester has to go through many tools to gather many information, ethical...