Google sues cybercriminal group Smishing Triad
-
Google sues China-based group using “Lighthouse” phishing kit in
large-scale smishing attacks to steal victims’ financial data. Google filed
a lawsuit agai...
On Hacking Back
-
Former DoJ attorney John Carlin writes about hackback, which he defines
thus: “A hack back is a type of cyber response that incorporates a
counterattack ...
Drilling Down on Uncle Sam’s Proposed TP-Link Ban
-
The U.S. government is reportedly preparing to ban the sale of wireless
routers and other networking gear from TP-Link Systems, a tech company that
current...
I'm Hosting a New Podcast
-
I'm hosting a new podcast for Corelight. Check out my first episode with
our field CTO, Vince Stoffer. Expect new episodes every two weeks. This is
no...
Update: cs-parse-traffic.py Version 0.0.6
-
This is a bugfix version. cs-parse-traffic_V0_0_6.zip (http)MD5:
AED53E99D7BFF14EC45F573663A91780SHA256:
C73614FD69660C4D0E851414D86091E9E90DE9A92D58F9E6AC...
הגליון המאה שבעים ותשעה של DigitalWhisper שוחרר!
-
הגליון המאה שבעים ותשעה של DigitalWhisper שוחרר!פורסם ב- October 31, 2025
05:04:52, על ידי- sapirxfed
ברוכים הבאים לדברי הפתיחה של הגליון ה-179 של Digita...
BestAV (Fake Antispyware affiliate) exposed
-
Hello everyone, it's been a while.
One of the first affiliate systems I ever infiltrated was BestAV, back in
2011, the same year I started XyliBox.
Over...
Tanker Network Security Scanner for CTFs!!
-
🔍 Advanced Nmap Service Scanner – Bash Script
This blog post introduces a powerful *Bash script* designed to automate and
streamline network service scan...
Andrew Hay’s 2025 Cybersecurity Predictions
-
As we approach 2025, the ever-evolving landscape of cybersecurity continues
to challenge professionals and organizations alike. Based on observed
trends an...
What a lovely sunset
-
Oh, hi. Long time no blog, eh?
Well, it is time to sunset this blog, I will be deleting it in the next few
weeks.
So long, and thanks for all the fis...
Simple PHP webshell with php filter chains
-
Recently found an LFI in a PHP application and one of the cool things I
learned about recently was PHP filter chains. More info here:
https://www.synacktiv...
Getting DNS Client Cached Entries with CIM/WMI
-
What is DNS Cache The DNS cache maintains a database of recent DNS
resolution in memory. This allows for faster resolution of hosts that have
been queried ...
Random CSO Musing
-
One of the biggest challenges of running a security organization is
balancing the ongoing efforts, with strategic directions, all while keeping
the “pressu...
Lucky Break
-
One of the things I do from time to time is throw out an open ended
question on Twitter. Sometimes I’m making a point, sometimes I just want
to amuse myse...
Indonesian Spam Communities
-
In our last post we tried to shed some light at what seemed to appear as a
very common PayPal phishing email at first glance, but evidently turned out
to b...
CoalaBot : http Ddos Bot
-
CoalaBot appears to be build on August Stealer code (Panel and Traffic are
really alike)
I found it spread as a tasks in a Betabot and in an Andromeda sp...
Big Changes Around the Corner for the IoT
-
The IoT is transforming before our eyes due to increasing regulations,
growing demand for security standards and advancements in the telecom
industry.
T...
ROOTCON 10 Capture The Flag Statistics
-
During ROOTCON 10, we introduced a new dedicated track for our Capture The
Flag, with the comfortable CTF tables and chairs the game was well
participated ...
Dridex Down Under
-
Raytheon | Websense® Security Labs™ has been tracking malicious email
campaigns associated with the Dridex banking Trojan since 2014. An
interesting deve...
Forensic
-
אחת מהבעיות העיקריות בביצוע תהליך FORENSIC הוא לאחר ביצוע תהליך שיכפול ה -
Harddisk (על פי כל התקנים של שיכפול ביט אחרי ביט), היא לבצע מחקר על *מחשב
חי...
TrustKeeper Scan Engine Update – February 4, 2015
-
The latest update to the TrustKeeper scan engine that powers our Trustwave
Vulnerability Management product (including both internal and external
vulnerabi...
RSA Announces End of RSA Security Conference
-
Aims to bring clarity to cloudy marketing messages through exhibit hall
chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of
EMC, today ...
botCloud – an emerging platform for cyber-attacks
-
Hosting network services on Cloud platforms is getting more and more
popular. It is not in the scope of this article to elaborate the advantage
of using Cl...