More

    Cybersecurity

    TOR is Shutting Down Support for v2 Onion Services

    In July 2020, the Tor Project released the timeline for the depreciation of version two onion services (v2) in favor of the more secure...

    0-Day Vulnerability – How it Works?

    A 0day (Zero-day) vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to...

    0-day vulnerability founded in popular WordPress plugin

    On April 21, 2021, the Wordfence Threat Intelligence reported a critical 0-day vulnerability that is being actively exploited in Kaswara Modern WPBakery Page Builder Addons. This...

    DNS attacks increasingly target service providers

    The telecommunications and media sector is the most frequent victim of DNS attacks, according to EfficientIP. DNS attacks on service providers According to the IDC 2020 Global...

    Orbit: Blockchain Investigation Tool

    Orbit is designed to explore network of a blockchain wallet by recursively crawling through transaction history. The data is rendered as a graph to...

    Old School Network Defense Wireless Tools

    As the use of wireless systems raises, there will be an increase in the probability of network compromising (whether malicious or unwitting configuration). Realizing that...

    Tyton: Rootkit Hunter

    Loadable kernel modules are an important companion of the Linux kernel, LKMs for example. Typically, LKMs are used to add or add extra system...

    Spoofing IP Datagram

    The data in the network layer is called datagrams. IPv4 does fragmentation for the datagrams. Each fragment is called a packet. The reason of...

    Trape: Easily Track People On Internet

    Trape is a OSINT analysis and research tool created by Github user jofpin, which allows people to track and execute very intelligent social engineering...

    Latest articles

    spot_img