Remove Computers and Electronics Remove Cyber Attacks Remove Hacking Remove Penetration Testing
article thumbnail

Scraping the TOR for rare contents

Security Affairs

Cyber security expert Marco Ramilli explains the difficulties for scraping the ‘TOR networks’ and how to enumerate hidden-services with s crapers. For this post “interesting links” means specific links that are rare or not very widespread and mostly focused on cyber-attacks and/or cyber-espionage.

article thumbnail

University, Professional Certification or Direct Experience?

Security Affairs

Alice knows exactly what cybersecurity defence systems has implemented and she knows eventually her network will be hit by the next cybersecurity attack. However she doesn’t know when the cyber attack will happen, what infrastructures the attacker will hit and what technique the attacker will use (phishing, exploiting, scam, etc).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Frequent VBA Macros used in Office Malware

Security Affairs

The malware expert Marco Ramilli collected a small set of VBA Macros widely re-used to “weaponize” Maldoc (Malware Document) in cyber attacks. Here comes the idea to collect a small set of VBA Macros widely re-used to “weaponize” Maldoc (Malware Document) in contemporary cyber attacks.

Malware 70
article thumbnail

Is APT27 Abusing COVID-19 To Attack People ?!

Security Affairs

Today, many reports are describing how infamous attackers are abusing such an emergency time to lure people by sending thematic email campaigns or by using thematic IM within Malware or Phishing links. Following few of them that I believe would be a nice reading: New Cyber Attack Campaign Leverages the COVID-19 Infodemic.

article thumbnail

Iranian Threat Actors: Preliminary Analysis

Security Affairs

Just like Charming Kitten ( which is not included into this report since it is a quite ongoing mistery even if a great report from Clear Sky is available ), Cleaver is a threat group that is responsible of one of the first most advanced and silent cyber attack attributed to Iran known until now ( OpCleaver , by Cylance).

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

1834 — French Telegraph System — A pair of thieves hack the French Telegraph System and steal financial market information, effectively conducting the world’s first cyberattack. 1870 — Switchboard Hack — A teenager hired as a switchboard operator is able to disconnect and redirect calls and use the line for personal usage. .