Russia Hackers Abusing BRc4 Red Team Penetration Tool in Recent Attacks

By Deeba Ahmed
Palo Alto Networks’ Unit 42 security researchers have discovered that Russian state-sponsored hackers are abusing the latest Brute…
This is a post from HackRead.com Read the original post: Russia Hackers Abusing BRc4 Red Team… Continue reading Russia Hackers Abusing BRc4 Red Team Penetration Tool in Recent Attacks

Tor IP Renewal For The Win

I’m using Tor for so long that I can’t remember! The main reasons to use it are to access some websites while preserving my anonymity (after all that’s the main purpose of Tor) but also to access dangerous resources like command & control servers or sites delivering malicious content. The

The post Tor IP Renewal For The Win appeared first on /dev/random.

Continue reading Tor IP Renewal For The Win

How to configure BurpelFish

I recently was doing a pentest and was continuously looking up translations for words, and thought “there has to be a better way…”. That is when I landed on BurpelFish, which adds a google translate context option to your BurpSuite’s right click. When … Continue reading How to configure BurpelFish

The Business Value of the Social-Engineer Phishing Service

Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations.  Additionally, they are developing techniques to use an…
The post The Business Value of t… Continue reading The Business Value of the Social-Engineer Phishing Service

Vishing Attacks Are on The Rise

Companies are becoming more aware of potential cybersecurity threats and taking measures to protect their critical assets and increase security. However, one aspect of cyberattacks that often goes unforeseen (until…
The post Vishing Attacks Are on Th… Continue reading Vishing Attacks Are on The Rise

Putting an Ultra-Tiny Linux Board in a Phone Charger…Eventually

Among security professionals, a “drop box” is a device that can be covertly installed at a target location and phone home over the Internet, providing a back door into what …read more Continue reading Putting an Ultra-Tiny Linux Board in a Phone Charger…Eventually

Grindr’s Bug Bounty Pledge Doesn’t Translate to Security

At SAS@Home, Luta Security CEO Katie Moussouris stressed that bug bounty programs aren’t a ‘silver bullet’ for security teams. Continue reading Grindr’s Bug Bounty Pledge Doesn’t Translate to Security