Hacking

bg
What is Attack Resistance Management?

What is Attack Resistance Management?

A Security Survey on How to Close Your Organization's Attack Resistance Gap

bg
Under the hood of Wslink’s multilayered virtual machine

Under the hood of Wslink’s multilayered virtual machine

ESET researchers describe the structure of the virtual machine used in samples of...

bg
Europe’s quest for energy independence – and how cyber‑risks come into play

Europe’s quest for energy independence – and how cyber‑risks...

Soaring energy prices and increased geopolitical tensions amid the Russian invasion...

bg
Cybersecurity survival tips for small businesses: 2022 edition

Cybersecurity survival tips for small businesses: 2022...

How can businesses that lack the resources and technological expertise of large...

bg
Women in tech: Unique insights from a lifelong pursuit of innovation

Women in tech: Unique insights from a lifelong pursuit...

Leading Slovak computer scientist Mária Bieliková shares her experience working...

bg
We’re going on Tor

We’re going on Tor

If better privacy and anonymity sound like music to your ears, you may not need...

bg
Fake e‑shops on the prowl for banking credentials using Android malware

Fake e‑shops on the prowl for banking credentials using...

ESET researchers analyzed three malicious applications targeting customers of eight...

bg
How secure is your cloud storage? Mitigating data security risks in the cloud

How secure is your cloud storage? Mitigating data security...

As cloud systems are increasingly the bedrock on which digital transformation is...

bg
Industroyer2: Industroyer reloaded

Industroyer2: Industroyer reloaded

This ICS-capable malware targets a Ukrainian energy company The post Industroyer2:...

bg
Innovation and the Roots of Progress

Innovation and the Roots of Progress

If you look back at the long arc of history, it’s clear that one of the most crucial...

bg
ESET takes part in global operation to disrupt Zloader botnets

ESET takes part in global operation to disrupt Zloader...

ESET researchers provided technical analysis, statistical information, and known...

bg
Hcltm - Documenting Your Threat Models With HCL

Hcltm - Documenting Your Threat Models With HCL

Threat Modeling with HCL Overview There are many different ways in which a threat...

bg
Gitbleed_Tools - For Extracting Data From Mirrorred Git Repositories

Gitbleed_Tools - For Extracting Data From Mirrorred Git...

This repo contains shell scripts that can be used to download and analyze differences...

bg
Octosuite - Advanced Github OSINT Framework

Octosuite - Advanced Github OSINT Framework

Simply gather OSINT on Github users and organizations like a god FEATURES Fetches...

bg
Cloak - A Censorship Circumvention Tool To Evade Detection By Authoritarian State Adversaries

Cloak - A Censorship Circumvention Tool To Evade Detection...

Cloak is a pluggable transport that enhances traditional proxy tools like OpenVPN...

bg
OffensiveNotion - Notion As A Platform For Offensive Operations

OffensiveNotion - Notion As A Platform For Offensive Operations

Notion (yes, the notetaking app) as a C2. Wait, What? Yes. But Why? What started...

bg
Uncover - Quickly Discover Exposed Hosts On The Internet Using Multiple Search Engine

Uncover - Quickly Discover Exposed Hosts On The Internet...

uncover is a go wrapper using APIs of well known search engines to quickly discover...

bg
Skanuvaty - Dangerously Fast DNS/network/port Scanner

Skanuvaty - Dangerously Fast DNS/network/port Scanner

Dangerously fast dns/network/port scanner, all-in-one.Start with a domain, and we'll...

Donate to us on BuyMeACoffee also we have built an app for this site with the real-time post receiving and notification to go and download it.