Hacking September 30, 2020 Jatin Jain Copy-paste compromises Although the concept of copy-paste compromises is not exactly new, there are now several different forms of the attack. In the version of copy-paste compromise...
Hacking September 28, 2020 Pedro Tavares Hacking Microsoft teams vulnerabilities: A step-by-step guide We are living in an era where technology is part of our lives and a primary valuable resource for personal and professional tasks. The use of online videoconference...
Hacking September 26, 2020 Dejan Lukan PDF file format: Basic structure [updated 2020] We all know that there are a number of attacks where an attacker includes some shellcode in a PDF document. This shellcode uses some kind of vulnerability in...
Hacking September 25, 2020 Howard Poston 10 most popular password cracking tools [updated 2020] Passwords are the most commonly used method for user authentication. Passwords are so popular because the logic behind them makes sense to people and they’re...
Hacking September 24, 2020 Pavitra Shankdhar Popular tools for brute-force attacks [updated for 2020] The brute force attack is still one of the most popular password-cracking methods. Nevertheless, it is not just for password cracking. Brute force attacks can...
Hacking September 23, 2020 Howard Poston Top 7 cybersecurity books for ethical hackers in 2020 Ethical hacking is a huge field with a number of different specializations within it. Since ethical hackers are expected to perform an assessment of the security...
Hacking September 9, 2020 Jatin Jain How quickly can hackers find exposed data online? Faster than you think … Data is an organization’s most valuable asset. An organization's data can consist of their financial details, consumer information, NPI, PII information,...
Hacking August 13, 2020 Pierluigi Paganini Hacking the Tor network: Follow up [updated 2020] In a previous post, I presented the main techniques used to hack Tor networks and de-anonymize Tor users. Law enforcement and intelligence agencies consider...
Hacking June 3, 2020 Christine McKenzie Podcast/webinar recap: What’s new in ethical hacking? Ethical hackers are at the front lines of the battle against cybercriminals. Since new forms of malware, APTs and ransomware are emerging every day, it’s...
Hacking April 14, 2020 Lester Obbayi Ethical hacking: TCP/IP for hackers In this article, we’ll discuss TCP/IP: the importance of mastering it and how this mastery can be beneficial to hackers. We will then look at how hackers...