The Inception attackers have been active since at least 2014 and have been documented previously by both Blue Coat and Symantec; historical attacks used custom malware for a variety of …
Tag:
Memory
-
OthersSecurity
SSL Decryption Series: The Security Impact of HTTPS Interception
by blackMOREby blackMOREEncrypted internet traffic is on an explosive upturn. According to the Google® Transparency Report: “Users load more than half of the pages they view over HTTPS and spend two-thirds of …
-
AMDHackingLinuxMetasploitMonitoringNetwork TrafficPasswordSecurityShell ScriptUS-CertWindowsWireshark
Publicly Available Tools Seen in Cyber Incidents Worldwide
by blackMOREby blackMORERemote Access Trojan: JBiFrost First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A …
-
DatabaseHow toKali LinuxLinuxPasswordPythonScanningSecurity
Configure, Tune, Run and Automate OpenVAS on Kali Linux
by blackMOREby blackMOREUsers often request the addition of vulnerability scanners to Kali, most notably the ones that begin with “N”, but due to licensing constraints, we do not include them in the …
-
BrowserDatabaseHackingMonitoringOthersPasswordScanningSecuritySecurity SoftwareSpam
Catching bad guys
by blackMOREby blackMOREEver wondered how the good guys catch bad guys? I meant to say, what’s the process of catching bad guys who create virus, malware, crypto-lockers? It’s sort of a grey …