Category: Ethical Hacking

Find out here the latest updates and information about ethical hacking, cyber security, IT Security and other related stuff of DICC.

3 January 2022

What Is a DDoS Attack And What Are Its Consequenses.

A distributed denial of service attack or DDoS (for its acronym in English), is an extension of a denial of service (DoS) attack that is carried out from the generation of a large flow of information or requests from various sources towards a specific goal. The difference between one and the other lies in the fact that a DoS attack is characterized by having a […]

3 January 2022

Know About The Jailbreak Everything And How Perform Pentesting On ios Application.

As we announced in the first article of the series “Pentesting guide in iOS applications”, today we bring you all the necessary information related to the world of jailbreak so that you can tackle the pentesting on iOS applications. Although this series of articles is not intended to be a pentesting course, it is important to highlight some requirements and generalities about this methodology in iOS applications. In […]

3 January 2022

The Top 5 Common Scam Models On Instagram.

Instagram is one of the most popular social networks. In fact, with more than 1 billion monthly active users, it is one of the four most popular social platforms in the world. However, these numbers also attract cybercriminals such as bees to honey, which they see in such a large number of users as potential targets of attack. In this article we will describe some of the […]

30 December 2021

What Is A Downloader A Type Of Trojan That Only Downloads Malware.

A downloader is a type of Trojan whose only functionality is to download one or more computer threats, who will be in charge of carrying out the malicious actions that the cybercriminal is looking for. Although a downloader does not contain a malicious payload itself, which helps it evade detection, this malware is considered both a method of propagation and a threat due to the role it plays in the […]

29 December 2021

What Is Cyber Threat Intelligence.

there is no clear definition that describes what threat intelligence is, which often leads to the misuse of this concept. We can say that Cyber ​​Threat Intelligence, also known simply as CTI, refers to the set of organized data on computer threats that allows to prevent or mitigate possible attacks. Many teams in the operations sector receive large volumes of alerts, including Indicators of Compromise (IoC), which are data that […]

29 December 2021

How To Scan Network Traffic With Brim For Malicious Activity.

Malware analysis is a difficult and complex task. For this, it is essential to have various tools that allow processing and interpreting large volumes of data to simplify the analysis work. Fortunately, when it comes to analyzing network traffic for malicious activity, there are very good tools available, such as Wireshark or NetworkMiner , which are well known and for which there is a lot of documentation available. However, this time we […]

28 December 2021

Why Machine Learning Is Great Elly For Cyber Security.

Although we have spoken on several occasions about Machine Learning and even our Augur product , this time we will do a little theoretical review for those who are not so familiar with this technology. What is Machine Learning? The machine learning , English Machine Learning (ML), is a branch of science that allows computers through a set of techniques to perform tasks without being explicitly programmed. Through ML, computers can generalize […]

28 December 2021

What Every Business Leader Should About Log4Shell.

In many cases, updating IT systems and installing security patches is a quiet affair with little concern for business leaders as they are more keen to get a budget approved so that the IT team can carry out this task. However, that silent approach is sometimes disrupted when a news flash emerges about a company that suffered a cyberattack or data breach due to a […]

27 December 2021

SS7 Hacking How Hackers Interrupt Your Call And Data.

Have you ever wondered how your calls always connect with the person you want to contact? That is because of SS7 (Signalling System 7). Today I am going to tell you all about SS7 protocol and SS7 HACKING that you should know and how hackers are using to steal your information. What is SS7? Signalling System 7 (SS7) or Common Channel Signalling System (CCSS7) in US or Common Channel Interoffice Signalling System 7(CCISS7) […]

27 December 2021

Ransomware To Pay Or Not To Pay Is It Legal Or Illegal.

The large number of cases of victims who decided to pay the ransom after being hit by ransomware do not reflect the best way to use the budgets allocated for cybersecurity or shareholder capital, nor the best way to use the funds provided by the insurance industry. So why have so many companies decided to pay, and what does it take to stop this from happening. […]