So You Want to Hire a Hacker? Here’s What You Need to Know

I've written previously on this topic but more in the line of getting involved with ransomware-as-a-service (RaaS). At that time, this was a relatively unknown area. It is now mainstream. Ransomware is everywhere and new variants of it show up every day. If this is what you're interested in, you'll have no problem finding information … Continue reading So You Want to Hire a Hacker? Here’s What You Need to Know

Distributive Spam Distraction Cloaks Serious Attacks

Do you ever wonder why some spam makes it past your spam filter and gets into your inbox? Well, there's a reason for this. The sender basically figured out the spam filter algorithm and was able to bypass it. They may have done it by pure luck but, in most cases, they do this by … Continue reading Distributive Spam Distraction Cloaks Serious Attacks

Phishing with the Mafia

There is a tradition in organized crime that is absent in cybercrime: The threat of physical violence. This threat is largely based on reputation. Once an individual or a group gets a reputation for violence and carrying out threats, they are in a superior bargaining position. There are no physical enforcers in the world of … Continue reading Phishing with the Mafia

Anonymous Releases 180GB of Data to Undermine Right Wing Groups… Maybe

Anonymous is anonymous. If you declare you are affiliated with the hacktivist group, Anonymous, then, you are. There is no main command and control center. There are just people with an axe to grind who band together to organize attacks on sites whose principles they don't agree with. The broadly defined banner is an anarchist … Continue reading Anonymous Releases 180GB of Data to Undermine Right Wing Groups… Maybe

Cobalt Strike: From Pentesting to the Hacker’s Toolkit

To begin this post on the dangers of Cobalt Strike, it is necessary to clarify some terms. First of all, 'pentest' is short for penetration test. It is an authorized, simulated cyberattack on a network for the purpose of finding vulnerabilities that may exist in that network. Those who perform this service are called, 'pentesters'. … Continue reading Cobalt Strike: From Pentesting to the Hacker’s Toolkit

How Much Data Does the Taliban Have on Afghans Who Helped Coalition Forces?

Although the Taliban has tried to re-brand itself as a kinder, gentler organization, no one has really been buying it. The prevailing opinion is that they will wear this disguise until they get money from the West, then, all bets are off. It has already been reported that the Taliban have a "priority list" of … Continue reading How Much Data Does the Taliban Have on Afghans Who Helped Coalition Forces?

Cyber Attacks on Aviation Up 530%

The title of this post alone should give you some pause; but there's more. According to the European Air Traffic Management Computer Emergency Response Team (EATM-CERT) the majority, 61%, of this increase is on airlines themselves. The graph below shows the sectors of the aviation industry and the number of cyber attacks witnessed over the … Continue reading Cyber Attacks on Aviation Up 530%

Social Media vs. the Taliban vs. ISIS vs. Humanity

The social media landscape in Afghanistan has transformed quite remarkably since the Taliban originally seized power in 1996. Back then, the Taliban were about the only people in the country using mobile phones. They found them useful in organizing attacks. Most Afghans, however, were in no position to afford a smartphone. Besides, mobile networks were … Continue reading Social Media vs. the Taliban vs. ISIS vs. Humanity

Vultur Android Malware Targeting Your Bank Account and Crypto Wallet

Most Android banking malware uses overlays to fool users into clicking on something they don't really want to click on. Often, this strategy sends victims to a fake banking login page where the attackers will gather login credentials. These they will quickly use to hack into the target's bank account. But this is not what … Continue reading Vultur Android Malware Targeting Your Bank Account and Crypto Wallet

The Escalating Iran-Israel Wiper Attack War

First of all, what's a wiper attack? Basically, it is what it says it is: a cyber attack with the simple goal of wiping out the data in a network. Yes, such attacks could be easily tweaked into ransomware attacks, but money isn't the goal of these attacks. Destruction is. Causing trouble is. In short, … Continue reading The Escalating Iran-Israel Wiper Attack War