Login
FreshRSS
Login
Secure Planet Training Courses Updated For 2019 - Click Here
Main stream
Favourites (0)
My labels
Security
/r/netsec - Information Security News & Discussion
Dark Reading:
ICS-CERT Alert Feed
InfoSec Resources
Infosec Island Latest Articles
Krebs on Security
McAfee Blogs
Naked Security
News ≈ Packet Storm
Paul's Security Weekly
SANS Internet Storm Center, InfoCON: green
Security – Cisco Blog
SecurityFocus News
The Hacker News
The Register - Security
The first stop for security news | Threatpost
Threatpost | The first stop for security news
Troy Hunt
Verisign Blog
WIRED
WeLiveSecurity
ZDNet | security RSS
http://blog.trendmicro.com/feed
Tools
KitPloit - PenTest Tools!
Security Tool Files ≈ Packet Storm
ToolsWatch.org – The Hackers Arsenal Tools Portal
Vulnerabilities
Advisory Files ≈ Packet Storm
Exploit-DB Updates
Full Disclosure
SecurityFocus Vulnerabilities
There are new available articles, click to refresh the page.
/r/netsec - Information Security News & Discussion
A technical analysis of the BackMyData ransomware used to attack hospitals in Romania
By:
/u/CyberMasterV
— February 19
th
2024 at 12:50
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A detailed analysis of the Menorah malware used by APT34
By:
/u/CyberMasterV
— December 20
th
2023 at 14:04
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Deep Dive into Cactus Ransomware
By:
/u/CyberMasterV
— October 23
rd
2023 at 13:04
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Deep Dive into Brute Ratel C4 payloads – Part 2
By:
/u/CyberMasterV
— September 27
th
2023 at 13:10
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A detailed analysis of the Money Message Ransomware
By:
/u/CyberMasterV
— September 15
th
2023 at 13:03
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Deep Dive into Brute Ratel C4 payloads
By:
/u/CyberMasterV
— August 31
st
2023 at 13:01
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Underground Ransomware deployed by Storm-0978 that exploited CVE-2023-36884
By:
/u/CyberMasterV
— August 14
th
2023 at 13:00
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A technical analysis of the Quasar-forked RAT called VoidRAT
By:
/u/CyberMasterV
— July 17
th
2023 at 13:55
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitation
By:
/u/CyberMasterV
— June 26
th
2023 at 14:03
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Android Malware on the Rise – A case study of AhMyth RAT
By:
/u/CyberMasterV
— June 21
st
2023 at 13:59
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Deep Dive into Medusa Ransomware
By:
/u/CyberMasterV
— May 23
rd
2023 at 13:03
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
How to Analyze Java Malware – A Case Study of STRRAT
By:
/u/CyberMasterV
— May 4
th
2023 at 06:16
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Revisiting Heaven's Gate with Lumma Stealer
By:
/u/CyberMasterV
— March 30
th
2023 at 13:59
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
ESXi Ransomware – A case study of Royal Ransomware
By:
/u/CyberMasterV
— March 8
th
2023 at 13:02
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Deep Dive Into a PoshC2 Implant
By:
/u/CyberMasterV
— February 21
st
2023 at 15:02
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Detailed Analysis of a New Stealer called Stealerium
By:
/u/CyberMasterV
— February 7
th
2023 at 14:57
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A step-by-step introduction to the use of ROP gadgets to bypass DEP
By:
/u/CyberMasterV
— January 23
rd
2023 at 15:04
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
How to Analyze JavaScript Malware – A Case Study of Vjw0rm
By:
/u/CyberMasterV
— January 10
th
2023 at 15:28
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Deep Dive into BianLian Ransomware [PDF]
By:
/u/CyberMasterV
— December 13
th
2022 at 15:00
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Detailed Analysis of The Last Version of REvil Ransomware [PDF]
By:
/u/CyberMasterV
— December 5
th
2022 at 15:00
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice
By:
/u/CyberMasterV
— November 23
rd
2022 at 08:55
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Technical Analysis of Royal Ransomware [PDF]
By:
/u/CyberMasterV
— November 14
th
2022 at 15:04
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Exploring ZIP Mark-of-the-Web Bypass Vulnerability (CVE-2022-41049)
By:
/u/CyberMasterV
— November 9
th
2022 at 08:49
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A technical analysis of Pegasus for Android – Part 3
By:
/u/CyberMasterV
— October 31
st
2022 at 14:02
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Ring0VBA - Getting Ring0 Using a Goddamn Word Document
By:
/u/CyberMasterV
— October 26
th
2022 at 14:05
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Chapter 1 — From Gozi to ISFB: The history of a mythical malware family
By:
/u/CyberMasterV
— October 25
th
2022 at 06:27
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A New Attack Surface on MS Exchange Part 4 - ProxyRelay
By:
/u/CyberMasterV
— October 19
th
2022 at 06:07
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Detailed Analysis of the Gafgyt Malware Targeting IoT Devices [PDF]
By:
/u/CyberMasterV
— October 18
th
2022 at 14:24
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
How to Investigate Insider Threats (Forensic Methodology)
By:
/u/CyberMasterV
— October 13
th
2022 at 14:43
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform
By:
/u/CyberMasterV
— October 11
th
2022 at 19:13
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Introducing Campaigns to MITRE ATT&CK
By:
/u/CyberMasterV
— October 6
th
2022 at 06:37
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Dissect: An incident response game-changer
By:
/u/CyberMasterV
— October 4
th
2022 at 20:27
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Phishing With Chromium's Application Mode
By:
/u/CyberMasterV
— October 2
nd
2022 at 08:57
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server
By:
/u/CyberMasterV
— September 29
th
2022 at 19:49
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Deep Dive Into the APT28’s stealer called CredoMap
By:
/u/CyberMasterV
— September 28
th
2022 at 14:00
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A technical analysis of Pegasus for Android – Part 2
By:
/u/CyberMasterV
— September 27
th
2022 at 13:02
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A technical analysis of the leaked LockBit 3.0 builder
By:
/u/CyberMasterV
— September 22
nd
2022 at 13:58
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
GTA 6 source code and videos leaked after Rockstar Games hack
By:
/u/CyberMasterV
— September 19
th
2022 at 07:02
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Detailed Analysis of the Quantum Ransomware [PDF]
By:
/u/CyberMasterV
— September 15
th
2022 at 12:04
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
By:
/u/CyberMasterV
— September 9
th
2022 at 19:48
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
TTPs Associated With a New Version of the BlackCat Ransomware
By:
/u/CyberMasterV
— September 7
th
2022 at 14:02
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Chromeloader browser hijacker
By:
/u/CyberMasterV
— September 3
rd
2022 at 17:46
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Vulnerability in TikTok Android app could lead to one-click account hijacking
By:
/u/CyberMasterV
— August 31
st
2022 at 17:30
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A technical analysis of Pegasus for Android – Part 1
By:
/u/CyberMasterV
— August 29
th
2022 at 13:03
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus
By:
/u/CyberMasterV
— August 25
th
2022 at 14:37
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
iOS Privacy: TikTok monitoring all keyboard inputs and taps
By:
/u/CyberMasterV
— August 19
th
2022 at 08:46
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Deep Dive Into Black Basta Ransomware
By:
/u/CyberMasterV
— August 16
th
2022 at 14:00
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
How I Hacked my Car
By:
/u/CyberMasterV
— August 13
th
2022 at 13:48
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Detailed Analysis of the RedLine Stealer
By:
/u/CyberMasterV
— August 1
st
2022 at 13:56
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
ImHex - A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM
By:
/u/CyberMasterV
— July 29
th
2022 at 18:20
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
How to analyze Linux malware – A case study of Symbiote
By:
/u/CyberMasterV
— July 26
th
2022 at 14:02
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A repository of Windows persistence mechanisms
By:
/u/CyberMasterV
— July 22
nd
2022 at 16:55
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Gitlab Project Import RCE Analysis (CVE-2022-2185)
By:
/u/CyberMasterV
— July 21
st
2022 at 14:48
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
A Deep Dive Into ALPHV/BlackCat Ransomware
By:
/u/CyberMasterV
— July 18
th
2022 at 14:09
submitted by
/u/CyberMasterV
[link]
[comments]
/r/netsec - Information Security News & Discussion
Build your first LLVM Obfuscator
By:
/u/CyberMasterV
— July 17
th
2022 at 10:29
submitted by
/u/CyberMasterV
[link]
[comments]
There are no more articles
✓
Mark all as read