Denial of service condition interrupted power company operations in the U.S.

A denial-of-service condition arose in an electric company supplying energy to various states in the west of the United States; according to cybersecurity specialists, the incident was serious enough for the American energy authority to be notified. The cybersecurity incident generated disruptions in the operation of some electrical systems for more than 10 hours during […]

Linux Parrot 4.6, new version of the operating system for pentesters

When we require working with a functional operating system for security analysis and ethical hacking, cybersecurity experts consider that Parrot Linux is, together with BlackArch, one of the best options available, even though there are also Windows-based options. The developers of Parrot Linux have just launched version 4.6 of this operating system, which has some […]

Top 20 Operating Systems for Hackers, Pentesters, Blue and Red Teamers

Here we listed the best operating systems used today by hackers, pentesters, blue and red teamers. (basically anyone in the security sector) These include penetration testing distro’s, specialized OS’s that focus’ malware analysis, wifi hacking, forensic investigations, network monitoring and even a honeypot distribution. The choice is completely yours! In case you’re totally new to […]

How to Build and Run a Cyber Security Operations Center

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise. Here we’ll take a look on building and running a security operation center.This includes a vast array of sophisticated detection and prevention technologies, a virtual sea of cyber intelligence reporting, and access […]

Rancher launches k3OS, the first Kubernetes operating system

Rancher Labs introduced k3OS, the industry’s first extremely lightweight operating system for Kubernetes. It has extremely low resource consumption, minimal operation, and second-level boot, which greatly simplifies in low-resource computing environments. Kubernetes operation, improve the security of Kubernetes operation and maintenance and fully enable edge computing scenarios. 3OS is a linux distribution designed to remove […]

An individual gets a two year sentence for operating a non-regulated Bitcoin exchange platform

A 22-year-old individual has been arrested and sentenced to two years imprisonment for operating a cryptocurrency exchange platform without registration before the U.S. Treasury Department, reported ethical hacking training specialists from the International Institute of Cyber Security (IICS). Jacob Burrell, a U.S. citizen living in Mexico, accepted that he did not take any action against […]

Operation SaboTor – Law Enforcement Agencies Arrested 61 Dark Web Users Who are Buying & Selling Malware

Law enforcement agencies announced the results of Operation SaboTor, a coordinated international operation targeting vendors and buyers of dark web market places. As a result of the operation, law enforcement agencies made 61 arrests and shuts down 50 Darknet accounts used for illegal activities. The joint operation between Europol, FBI, and DEA conducted between January […]

Threat Intelligence With Two Most Used Operating Systems

With 4.312 billion users in the world, comprising 55.6% of the global population, the Internet has become an everyday center hub for almost all human events and actions. Be it for entertainment, information, remote computing, communication and many aspects of 21st century lifestyle. Across the board the most common operating systems with consumer devices in […]

Opera Browser Now Has Its Own Free VPN For Android Users

Popular web browser Opera has now incorporated its VPN for Android users as part of a new software update (Opera for Android 51) for its Android app version. Android users will receive free VPN protection, which has expanded from Opera’s desktop version and Android beta. To recall, the availability of the free VPN was previously restricted to Android […]

PrimeOS Is An Android-based Desktop Operating System For Old PCs

A few years ago, whenever we looked for options to run Android on a desktop PC, Remix OS seemed like an obvious choice. However, the OS was discontinued by its company due to some internal issues. Since then, newer players have appeared on the horizon to let you run Android apps on your PC. One […]

Operating Systems can be Detected using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, which used to find the Availability of a host on an Internet Protocol (IP) network. Ping operates by sending Internet Control Message Protocol (ICMP) Echo Request packets to the target host and waiting for an ICMP Echo Reply. TTL […]

Critical zero-day vulnerability in Windows operating systems

The flaw requires being combined with a Chrome browser exploit Network security and ethical hacking specialists from the International Institute of Cyber Security recommend Windows operating system users to upgrade to version 10 to protect against a critical vulnerability that has already been exploited in the wild. Unidentified threat actors have combined an unpatched local privilege escalation exploit […]

Operation Sharpshooter – Researchers Linked the Global Campaign to Lazarus Hacker Group

Security researchers from McAfee linked the global campaign dubbed Operation Sharpshooter to the infamous Lazarus Hacker Group. Sharpshooter campaign targets primarily on financial services, government, and critical infrastructure. The campaign was first identified in 2018, but according to the new analysis report, the campaign started as early as September 2017. Attackers targets broader set of […]

Implementing Operational Security, The Process and Best Practices

procedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations from the perspective of an adversary, and draw conclusions to protect sensitive information from falling into the wrong hands. OPSEC is becoming popular in the private sector though it was used by the […]

Hacker pleads guilty to operating for-hire DDoS sites

Police agencies found the hacker after he used the IP of his address to access his platforms According to network security and ethical hacking specialists from the International Institute of Cyber Security, a U.S. citizen has pleaded guilty to administering eight different online platforms that provided stresser services to deploy Denial of Service (DDoS) attacks […]

Another Aadhaar Breach: Aadhaar Operator’s Credentials Stolen And Misused

It seems like India’s unique identity number Aadhaar has become habitual of occasional security lapses as another security breach case is raising more questions regarding the security of users’ data. According to a report by HuffPost India, an Aadhaar operator named Vikram Sheokhand has fallen prey to unauthorized access of his biometrics which has been misused several times. Vikram is […]

Kali Linux 2019.1 Released — Operating System For Hackers

Wohooo! Great news for hackers and penetration testers. Offensive Security has just released Kali Linux 2019.1, the first 2019 version of its Swiss army knife for cybersecurity professionals. The latest version of Kali Linux operating system includes kernel up to version 4.19.13 and patches for numerous bugs, along with many updated software, like Metasploit, theHarvester, […]