Month: May 2018


Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…


Does Your Business Really Know How To Handle A Data Breach?

Whilst data breaches can result in substantial fines that can hit company finances hard, they have many, often more immediate, impacts. Businesses that do not respond quickly and decisively at the first sign of a data breach will find themselves constantly struggling to play catch-up. This means that when the fine hits they are often in such a weakened state that they cannot recover. The brutal truth is that 66% of small to medium businesses go out of business after a data breach.  …

Cyber ThreatsEDITOR’S NEWS

RiskIQ’s Q1 Mobile Threat Landscape Report finds cryptocurrency and feral apps dominate; malicious apps in global app stores decline

RiskIQ, the global leader in digital threat management, today released its Mobile Threat Landscape Q1 2018 Report, which analysed 120 mobile app stores and more than two billion daily scanned resources. The findings showed that taking advantage of the popularity and volatility of the cryptocurrency landscape is paying off for threat actors via the mobile attack vector and that malicious apps leveraged by nation-state actors are becoming more prominent.   In March, an app called Calendar 2, which appeared in the Apple App Store,…


Trickbot and IcedID Botnet Operators Collaborate to Increase Impact

It wasn’t too long ago when different banking malware competed for victims, often seeking out and uninstalling one another upon compromising machines. Now, in what may indicate a shift toward more collaboration among cybercrime groups, the operators of the “IcedID” and “TrickBot” banking Trojans appear to have partnered and are likely sharing profits, based on operation details. Flashpoint analysts recently examined samples that indicate computers infected with IcedID are also downloading TrickBot, a prolific piece of banking malware that analysts consider to be the successor to the “Dyre” banking malware. Researchers first…

Cyber ThreatsEDITOR’S NEWS


Do you ever log on to a public WiFi hotspot to check on your bank balance, transfer money or maybe make online purchases? If the answer to these questions is yes, then according to Santander, your personal or online banking security could be compromised in just minutes.   As part of Santander’s campaign to raise consumer awareness of how to avoid scams, Santander challenged SAS graduate 86 year old Alec Daniels from Hampshire, to write and distribute a pretend phishing email, as well as…

Cyber ThreatsEDITOR’S NEWS

Bitglass 2018 Report: Cloud Security Adoption Trails Cloud Usage, Leaving Two Thirds of Organizations Vulnerable

Bitglass, the Next-Gen CASB company, today released the 2018 Cloud Adoption Report, its fourth such study, which examines cloud adoption in more than 135,000 organizations around the globe. The report corroborates what is now broadly apparent –  the flexibility, productivity and cost savings benefits of cloud apps have fueled widespread adoption in every industry. Surprisingly, the report finds that the adoption of cloud security technologies lags cloud adoption, leaving many at risk of a data breach.   The report finds that while 81 percent…


Attackintel – Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups

A simple python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.GoalsQuickly align updated tactics, techniques, mitigation, and detection information from MITRE ATT&CK API for a specific threatBrush up on my python skills and get familiar with GIT while drinking coffeeHow ToUse one of two methods:If (python3 is installed):Download script from gitpython3 attackintel.pyElse:Cut & paste script from git into your favorite online python emulatorSelect a threat number from the menu to get tactics, techniques, mitigation,…

AWSCrawlerDiskoverDuplicate FilesElasticsearchFile IndexingFilesystem AnalysisFilesystem IndexerFilesystem VisualizationKibanaNEW TOOLSRedisSearch Engine

Diskover – File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch

diskover is an open source file system crawler and disk usage software that uses Elasticsearch to index and manage data across heterogeneous storage systems. Using diskover, you are able to more effectively search and organize files and system administrators are able to manage storage infrastructure, efficiently provision storage, monitor and report on storage use, and effectively make decisions about new infrastructure purchases.As the amount of file data generated by business' continues to expand, the stress on expensive storage infrastructure, users and system administrators, and…

Cyber ThreatsEDITOR’S NEWS

New global study reveals consumers are happy to share their data

Consumers are more aware than ever of how their personal information may be collected and used, due to recent media interest and the new General Data Protect Regulation (GDPR) coming into force in Europe. Today, a new global survey reveals that despite significant cultural differences and maturity of their respective data economies, the majority of people (77%) are pragmatic or unconcerned about sharing their data. The figures come from the first ‘Global data privacy: What the consumer really thinks’ report – commissioned by the…

Cyber ThreatsEDITOR’S NEWS

UK the most breached country in Europe, but organisations aren’t feeling the threat

Thales, a leader in critical information systems, cybersecurity and data security, announces the results of its 2018 Thales Data Threat Report, European Edition, revealing the UK as Europe’s most breached country of last year. However, despite a 24 per cent increase in the number of attacks – figures rose from 43 per cent to 67 per cent year on year – British businesses claimed to feel less vulnerable to data threats, compared to those across Germany, Sweden and the Netherlands. Last year in numbers                                         …