11 January 2022

How Block Chain Works.

Blockchain has become a common expression in matters related to the famous Bitcoins, and sometimes the two terms get a little confused. If you want to find out, after all, what Blockchain really means and what it is for. How did Blockchain come about? In 2008, an article was presented to the discussion group “The Cryptography Mailing” containing the working principles of a cryptocurrency called Bitcoin. The […]

Please follow and like us:
Pin Share
11 January 2022

The Coronavirus Scams.

The outbreak of contagion we are going through has left many people on alert on the subject and, unfortunately, has caused a series of virtual scams with the coronavirus. The pandemic, which began in China in December last year, has spread and cases have already been reported in about 140 countries, including India. Due to this worldwide proportion, the terms coronavirus and Covid-19, the disease caused by the virus, […]

Please follow and like us:
Pin Share
3 January 2022

What Is a DDoS Attack And What Are Its Consequenses.

A distributed denial of service attack or DDoS (for its acronym in English), is an extension of a denial of service (DoS) attack that is carried out from the generation of a large flow of information or requests from various sources towards a specific goal. The difference between one and the other lies in the fact that a DoS attack is characterized by having a […]

Please follow and like us:
Pin Share
3 January 2022

Know About The Jailbreak Everything And How Perform Pentesting On ios Application.

As we announced in the first article of the series “Pentesting guide in iOS applications”, today we bring you all the necessary information related to the world of jailbreak so that you can tackle the pentesting on iOS applications. Although this series of articles is not intended to be a pentesting course, it is important to highlight some requirements and generalities about this methodology in iOS applications. In […]

Please follow and like us:
Pin Share
3 January 2022

The Top 5 Common Scam Models On Instagram.

Instagram is one of the most popular social networks. In fact, with more than 1 billion monthly active users, it is one of the four most popular social platforms in the world. However, these numbers also attract cybercriminals such as bees to honey, which they see in such a large number of users as potential targets of attack. In this article we will describe some of the […]

Please follow and like us:
Pin Share
30 December 2021

What Is A Downloader A Type Of Trojan That Only Downloads Malware.

A downloader is a type of Trojan whose only functionality is to download one or more computer threats, who will be in charge of carrying out the malicious actions that the cybercriminal is looking for. Although a downloader does not contain a malicious payload itself, which helps it evade detection, this malware is considered both a method of propagation and a threat due to the role it plays in the […]

Please follow and like us:
Pin Share
29 December 2021

What Is Cyber Threat Intelligence.

there is no clear definition that describes what threat intelligence is, which often leads to the misuse of this concept. We can say that Cyber ​​Threat Intelligence, also known simply as CTI, refers to the set of organized data on computer threats that allows to prevent or mitigate possible attacks. Many teams in the operations sector receive large volumes of alerts, including Indicators of Compromise (IoC), which are data that […]

Please follow and like us:
Pin Share
29 December 2021

How To Scan Network Traffic With Brim For Malicious Activity.

Malware analysis is a difficult and complex task. For this, it is essential to have various tools that allow processing and interpreting large volumes of data to simplify the analysis work. Fortunately, when it comes to analyzing network traffic for malicious activity, there are very good tools available, such as Wireshark or NetworkMiner , which are well known and for which there is a lot of documentation available. However, this time we […]

Please follow and like us:
Pin Share
28 December 2021

Why Machine Learning Is Great Elly For Cyber Security.

Although we have spoken on several occasions about Machine Learning and even our Augur product , this time we will do a little theoretical review for those who are not so familiar with this technology. What is Machine Learning? The machine learning , English Machine Learning (ML), is a branch of science that allows computers through a set of techniques to perform tasks without being explicitly programmed. Through ML, computers can generalize […]

Please follow and like us:
Pin Share
28 December 2021

What Every Business Leader Should About Log4Shell.

In many cases, updating IT systems and installing security patches is a quiet affair with little concern for business leaders as they are more keen to get a budget approved so that the IT team can carry out this task. However, that silent approach is sometimes disrupted when a news flash emerges about a company that suffered a cyberattack or data breach due to a […]

Please follow and like us:
Pin Share