Linux Red Team Exploitation Techniques

In order to follow along with the tools and techniques utilized in this document, you will need to use one of the following offensive Linux distributions: Kali Linux Parrot OS MITRE ATT&CK... Read more »

Red Team Reconnaissance Techniques

Learn how to perform active and passive reconnaissance on targets Prerequisites & Requirements In order to follow along with the tools and techniques utilized in this document, you will need to use... Read more »

Want to Setup Your Career in Cybersecurity?

You need to read this first !! To havecareer in cyber security you need to have a Technology & IT background with your bachelors degree and also have the basic knowledge of... Read more »

Biggest cryptocurrency heist in the last decade. Hackers stole over 600 millions dollar worth of crypto currency

Hackers exploited a vulnerability in Poly Network, a platform that looks to connect different blockchains so that they can work together. Polygon Network announced Tuesday it was attacked on three blockchains: Ethereum,... Read more »

Use of Artificial Intelligence and Will it take over Cyber Security professionals?

Introduction Before starting off with the big questions , let us try to define both Artificial Intelligence or Cyber Security in simplistic terms. Artificial Intelligence , to put it in layman’s terms... Read more »
Zoom Secure Network?

Explore Easy Ways to Secure Your Zoom Meeting

Zoom is the best in modern enterprise video, calling communications, with an easy, reliable cloud platform for video and audio conferencing, chat, collaboration, and webinars across digital devices, ( Mobile, desktops, telephones,... Read more »
Cyber Security Training Is Important

Why Cyber Security Training Is Important

Web or Cybersecurity is the protection of internet-connected digital systems, including hardware, software, and data, from hacker. In a computing context, security comprises cybersecurity and physical security both are used by enterprises... Read more »

#OpJerusalem 2019 Campaign spreading JCry Ransomware in now infecting Windows users

INTRODUCTION:  Since last 5 years around a new ransomware campaign infected server users around the world as part of the hashtag called #OpJerusalem campaign. It’s updated ransomware which is written in “Go”... Read more »

New Malware found using Google Drive: It is a command-and-control server

Since most security tools also keep an eye on the network traffic to detect malicious IP addresses, attackers are increasingly adopting infrastructure of legitimate services in their attacks to hide their malicious... Read more »

New Wireshark 3.0 version Released: With IP Map Feature

Introduction: Wireshark is the world’s foremost and widely used Network Protocol Analyzer by Ethical Hackers, Network Administrators, and Cyber Security Professionals. Wireshark is a very easy tool to handle, it sniffs all... Read more »