Users login

Create an account »


Users login

YiSpecter iOS malware

The first iOS malware capable of infecting stock and jailbroken iOS devices has been identified. It's target are users running iOS 8.


Household Appliances Sending Spam, opening backdoors

Proofpoint published research of never seen but heavily theorized Internet-of-Things cyber attack. They believe this is an industry first - standard household appliances such as smart TVs and Refrigerators used to send malicious and junk email accross the globe.


Assange and Wikileaks Team at CCC Conference

Wikileaks team and the World's most famous activist whistleblower are holding a talk in Saal 1 at Chaos Communication Congress in Hamburg, Germany.


NSA and GCHQ use Google's cookies to identify targets

According to documents released by Edward Snowden, NSA and GCHQ (UK version of NSA) use Google's cookies, primarily designed for interest-based ad-targeting, to identify their targets.


U.S. Marines Website hacked and defaced

The official Website of U.S. Marines got hacked today by the hacktivist group Syrian Electronic Army following President Obama's announcement that he would seek congressional approvement for a military strike against Syria.


Facebook Virus Masked as Video!

A new virus which is masquerading as a video message can hijack Facebook accounts and Google Chrome browsers.


Google Palestine hacked! NOT!

News is spreading that was hacked by a Palestinian hacker group. The apparent hack actually consisted of posioning root DNS servers of the .ps TLD system. The DNS attack of course had political motives.


Hacking HTTPS in under 30 seconds

Department of Homeland Security issued an on Friday (02 Aug) following a vulnerability disclosure in all versions of the transport layer security (TLS) and secure sockets layer (SSL).


ATM hacking scams: Thailand becoming top target

It seems more and more foreigners do their ATM hacking in Thailand. In the last 18 months over 10 groups of various nationalities have been arrested across Thailand for stealing.


Using Fake GPS Signals to Hijack $80m Yacht

Students from University of Texas at Austin were successful in spoofing GPS signals and steering $80m worth yacht off course. The experiment took place 30 miles off the coast of Italy while the yacht was sailing in international waters.


HowTo Videos

Owning Windows Domain through MSSQL reverse shell

Demonstrating reverse shell attack on MSSQL

Introduction to Shell code

Basics of shell code and practical usage examples

Dissecting the Dyre Loader

Read about Dissecting the Dyre Loader

Dyre or Dyreza, is a pretty prominent figure in the world of financial malware. The Dyre of today comes loaded with a multitude of modules and features while also appearing to be well maintained. The first recorded instance of Dyre I have found is an article in June 2014 and the sample in question is version 1001, while at the time of this report Dyre is already up to version 1166. While the crypters and packers have varied over time, for at least the past 6 months Dyre has used the same loader to perform it's initial checks and injection sequence. It is the purpose of this report to go through the various techniques and algorithms present in the loader, and at times reverse them to python proof of concepts.
» Full paper on Dissecting the Dyre Loader

Virus updates

Tips & Tricks

We're introducing a new tutorials section. Stay tuned...

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »