Prodefence Security News

Security news from our website.
This post is a collection of a few articles divided in 3 sections (posted here as a reminder valuable for any cyber security professional) – a) Malware Types explained by hackingtutorials b) Malware analysis Toolkit by Ryan (rshipp) c) How to build a malware analysis Lab by Lenny d) A...

This post is a collection of a few articles divided in 3 sections (posted here as a reminder valuable for any cyber security professional) – a) Malware Types explained by hackingtutorials b) Malware analysis Toolkit by Ryan (rshipp) c) How to build a malware analysis Lab by Lenny d) A...

The current crisis of encryption is in part due to a lack of intelligence. The governments of the UK and Australia are talking about bans, regulations, requirements and other legal structures to address the perceived problem of “going dark”. The problem, inside the nutshells that are the May and...

The current crisis of encryption is in part due to a lack of intelligence. The governments of the UK and Australia are talking about bans, regulations, requirements and other legal structures to address the perceived problem of “going dark”. The problem, inside the nutshells that are the May and...

A critical vulnerability has been discovered in Microsoft-owned most popular free web messaging and voice calling service Skype that could allow hackers to remotely execute malicious code and crash systems. Skype is a free online service that allows users to communicate with peers by voice,...

A critical vulnerability has been discovered in Microsoft-owned most popular free web messaging and voice calling service Skype that could allow hackers to remotely execute malicious code and crash systems. Skype is a free online service that allows users to communicate with peers by voice,...

The Shadow Brokers, a notorious hacking group that leaked US cyberweapons — which were also abused by the recent ransomware disasters WannaCry and Petya or NotPetya — has now threatened to unmask the identity of a former hacker who worked for the NSA. Besides this, the Shadow Brokers group...

The Shadow Brokers, a notorious hacking group that leaked US cyberweapons — which were also abused by the recent ransomware disasters WannaCry and Petya or NotPetya — has now threatened to unmask the identity of a former hacker who worked for the NSA. Besides this, the Shadow Brokers group...

In last part of the article we have discussed the process of Requirement Collection, Information gathering and URL discovery now we will discuss the other steps. Automated Scanner Configuration: Scanner configuration is one of the most critical parts of the process. If anything goes wrong, then...

In last part of the article we have discussed the process of Requirement Collection, Information gathering and URL discovery now we will discuss the other steps. Automated Scanner Configuration: Scanner configuration is one of the most critical parts of the process. If anything goes wrong, then...

Armada Collective, a group of online attackers, is demanding a ransom payment of $315,000 from South Korean banks – In the case of refusal, the group has threatened the banks with a series of massive Distributed Denial of Service (DDoS) attacks. The threats came days after South Korean web...

Armada Collective, a group of online attackers, is demanding a ransom payment of $315,000 from South Korean banks – In the case of refusal, the group has threatened the banks with a series of massive Distributed Denial of Service (DDoS) attacks. The threats came days after South Korean web...

Computer systems around the world have been hit with a new ransomware malware called Goldeneye, a variant of Petya ransomware. Its targets are governments and businesses; infecting computers and files to lock out users and demanding $300 in Bitcoin to regain access. Upon infecting a system the...

Computer systems around the world have been hit with a new ransomware malware called Goldeneye, a variant of Petya ransomware. Its targets are governments and businesses; infecting computers and files to lock out users and demanding $300 in Bitcoin to regain access. Upon infecting a system the...

A Dark Web hacker going by the online handle of “nclay” is claiming to have hacked the popular Internet radio and social networking website 8Track.com and has stolen 18 million accounts (18,674,447) of its registered users. The hacker tells HackRead that the website was hacked earlier this...

A Dark Web hacker going by the online handle of “nclay” is claiming to have hacked the popular Internet radio and social networking website 8Track.com and has stolen 18 million accounts (18,674,447) of its registered users. The hacker tells HackRead that the website was hacked earlier this...

Unfortunately, we are no strangers to the knowledge that pedophilia is common on the dark web. Even if you don’t click on the links, you can almost always find them (even on the Hidden Wikis). The sad reality is that these websites are not all honeypots or “click bait” – some of them are very...

Unfortunately, we are no strangers to the knowledge that pedophilia is common on the dark web. Even if you don’t click on the links, you can almost always find them (even on the Hidden Wikis). The sad reality is that these websites are not all honeypots or “click bait” – some of them are very...

We all remember the Dark Overlord (probably). They provided diehard OITNB fans with the first ten episodes of the fifth season. After threatening several other networks, they followed through with at least one promise by releasing a few episodes of Steve Harvey’s new talk show. TDO must have...

We all remember the Dark Overlord (probably). They provided diehard OITNB fans with the first ten episodes of the fifth season. After threatening several other networks, they followed through with at least one promise by releasing a few episodes of Steve Harvey’s new talk show. TDO must have...

Pinterest
Αναζήτηση