Balaji

VENOM – An Exploitation Tool to Bypass Anti Virus Detection with Encrypted Payloads

Nowadays many Malware and Payloads are using Encryption techniques and packing techniques using Packers to Evade the Anti Virus Software…

2 years ago

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep Web The deep web, invisible web, or hidden web are parts of the World Wide Web whose…

2 years ago

Massive Cyber Attack Across the World Against ISPs & Data Centres: More than 200,000 Cisco Switches Hacked

Biggest Hackers Group Performing Massive Cyber attack against internet service providers, and data centers around the world by compromising Cisco switches. Hackers compromised…

2 years ago

Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active attack before indicators of…

2 years ago

7 Android Apps on the Google Play Drop Malware and Opens a Backdoor to Hackers

Researchers discovered seven malicious apps from the Google Play store that drops malware and adware on Android users and opens…

2 years ago

Wireless Penetration Testing Checklist – A Detailed Cheat Sheet

Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses…

2 years ago

SN1PER – Most Advanced Automated Penetration Testing Tool – 2023

Sn1per is an automated scanner that can automate the process of collecting data for exploration and penetration testing. In their…

2 years ago

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

Web Application Pentesting is a method of identifying, analyzing, and Report the vulnerabilities which are existing in the Web application…

2 years ago

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information…

2 years ago

Hackers Distributing Anubis Malware via Google Play Store to Steal Login credentials, E-wallets, and Payment Cards Details

Anubis banking malware re-emerges again and the threat actors distribute the malware on Google Play store apps to steal login credentials…

2 years ago