News

Latest News

Sergei Yarets is free

Sergei Yarets is free! Revelations of Andromeda botnet operator Ar3s

"If the FBI, Interpol and the" K "arrived, they have something on me." That same hacker known as Ar3s from Rechitsa for the first time talks about his case with facts and numbers. Sergei Yarets, known...
debugging

Logging as a way to debug a code

Why is it important to forbid self-debugging by hand? When you debug a program, you yourself, without realizing it, think that for one debugging session, fix all the problems that have arisen in the framework of this...
Automating the actions of the attacker using metasploit and Python

Automating the actions of the attacker using metasploit and Python

It is known that the metasploit is written in Ruby and does not support scripts written in Python so it requires some additional tuning to automate the actions of the attacker using metasploit and Python. Despite...
infosec-what-to-read

What to read at the weekend: 5 books on practical information security

We are often asked which books are worth reading to those who take the first steps in the field of information security? Our team of experts on penetration testing compiled a selection of books that...
who-scans-internet-australia-exists

Who scans the Internet and whether Australia exists

Anyone who raised the sites knows that it is worthwhile to start the web server, as requests begin to come to it. Also, DNS does not really know about it, and in the httpd...
DDos Protection concept image with pentagon shield and lock illu

How to protect web app on PHP from simple DDoS attacks

Quite recently an advertising article about the anti-DDoS attacks at the application level appeared on the hub. I had a similar experience of searching for the optimal algorithm for countering attacks, who can come...
sqlmap-advanced-guide

Sqlmap Advanced Guide

Today we will work with most popular sql injection scanning tool and go in depth with sqlmap advanced guide. sqlmap is an attack tool which can be effectively used to perform SQL injection attacks and post exploitation...
british-cyber-sec-center

Britain’s National Cyber Security Centre Issues a Warning of a Global Campaign for the...

Britain's National Cyber Security Centre (NCSC) is on high caution for the likelihood of some kind of Russian movement. More people and resources have been dedicated towards the examination and investigation. The FBI and the...
druppalgedon-2

Drupalgeddon 2 Vulnerability Used to Infect Servers With Backdoors & Coinminers

Hackers haven't wasted their time in deciding what to do with the proof-of-concept (PoC) called Drupalgeddon 2 code that was published online last week for a major Drupal security flaw. According to multiple sources, attackers...
intel-processor

Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning

Global chip-maker Intel on Tuesday announced two new technologies — Threat Detection Technology (TDT) and Security Essentials — that not only offer hardware-based built-in security features across Intel processors but also improve threat detection...

Bug Bounty