Thursday, April 25, 2024

Yearly Archives: 2021

Tor2mine Cryptominer Evolves to Pose a Bigger Threat

  In recent years, cryptocurrency mining campaigns have taken a front-row seat in the threat landscape as cryptocurrency has gained popularity among users. As cryptomining...

FBI: Cuba ransomware group hit 49 critical infrastructure organizations

  FBI released a new alert regarding Cuba ransomware, which warned that the gang had targeted "49 companies in five vital infrastructure sectors" and demanded...

Thieflock and Yanluowang Ransomware Share Same Genes

According to fresh research, a threat actor related to the Thieflock ransomware operation may now be using the Yanluowang malware. The ransomware was utilized...

Researchers Detail How Pakistani Hackers Targeting Indian and Afghan Governments

  Indian and Afghan governments are being targeted by Pakistani hackers for stealing sensitive credentials from Google, Twitter, and Facebook. They used to stealthily access...

Window-Rat

The goal of this programme is to test the protection provided by Windows 10 Defender as well as other antivirus software. A Very Simple...

Digital-Forensics-Lab

Students and faculty can use free hands-on digital forensics labs. Features:- Hands-on Digital Forensics Labs: designed for Students and Faculty Linux-based lab: All labs are...

Emotet Trojan returned after the takedown: detected in Japan

  The Emote virus, widely regarded as the most destructive malware in the world, has reappeared with new campaigns and was recently discovered infecting machines...

Hospital Ransomware Attacks Go Beyond Health Care Data

The health-care industry has recently been in the spotlight. It has been a prominent target for ransomware in addition to assisting in the control...

ELFXtract: — Enumerating ELF Binaries Using an Automated Analysis Tool.

Features of this tool includes:- Information about the file Information about shared object dependencies Checksec / ELF Security Mitigation Details Fill in the blanks ...

Cracken: – Cracken is a tool that generates password wordlists

Cracken is used for:- Making Hybrid-Masks in a VERY SHORT AMOUNT OF TIME (see performance section) Creating Smartlists - a concise and representative list...

Most Read

Write For Us