Norton – Where Cybercrime Goes to Hide 1 min read Videos Norton – Where Cybercrime Goes to Hide admin November 30, 2017 Norton explores the secret world of bulletproof hosting that’s hidden deep in underground bunkers, isolated at sea,...Read More
Breach-Risk Platform for proactive cyber security with Mukul Kumar of Balbix 1 min read Videos Breach-Risk Platform for proactive cyber security with Mukul Kumar of Balbix Pentester Academy TV November 30, 2017 The AI-powered Breach-Risk Platform analyzes assets, users, and network traffic to evaluate risk. The resulting analysis is...Read More
How to Scan Website Vulnerabilities with kali Linux in Real World 1 min read Videos How to Scan Website Vulnerabilities with kali Linux in Real World Shamim Akhtar November 30, 2017 How to Scan Website Vulnerabilities with kali Linux in Real World 2017-11-30 15:42:43 sourceRead More
Mark Zaid, keynote for Cybersecurity and the Law Conference 1 min read Videos Mark Zaid, keynote for Cybersecurity and the Law Conference admin November 30, 2017 sourceRead More
Rubica – How to video 1 min read Videos Rubica – How to video admin November 30, 2017 Rubica is real-time security and privacy protection service that works behind the scenes. Keeping you safe from...Read More
Automatic Pentest Tool Installer For Kali Linux 2017.3 1 min read Videos Automatic Pentest Tool Installer For Kali Linux 2017.3 SSTec Tutorials November 30, 2017 Automatic Pentest Tools Installer 2017 A Simple tool for installing pentest tools and forensic tools on Debian...Read More
HackIT Cup 2017 – Bug Bounty Marathon, Ukraine 1 min read Videos HackIT Cup 2017 – Bug Bounty Marathon, Ukraine Hack IT November 30, 2017 HackIT Cup is a bug bounty marathon that has been held on September 25-27, 2017. Ukraine gathered...Read More
Web Privacy Measurement Framework: OpenWPM 2 min read Privacy Web Privacy Measurement Framework: OpenWPM admin November 30, 2017 Web Privacy Measurement is the observation of websites and serves to detect, characterize and quantify privacy-impacting behaviors....Read More
Transparent Man-in-the-Middle TLS Proxy: ratched 2 min read Pentest Tools Transparent Man-in-the-Middle TLS Proxy: ratched admin November 30, 2017 ratched is a Man-in-the-Middle (MitM) proxy that specifically intercepts TLS connections. It is intended to be used...Read More
Machine Learning Image Steganalysis: Aletheia 3 min read Pentest Tools Machine Learning Image Steganalysis: Aletheia admin November 30, 2017 Aletheia is a steganalysis tool for the detection of hidden messages in images. The goal of steganalysis...Read More
Linux Memory Cryptographic Keys Extractor: CryKeX 2 min read Pentest Tools Linux Memory Cryptographic Keys Extractor: CryKeX admin November 30, 2017 Some work has been already published regarding the subject of cryptograhic keys security within DRAM. Basically, we need to...Read More
XSS Attacks and How to Prevent Them 1 min read Videos XSS Attacks and How to Prevent Them JavaScriptMN November 30, 2017 2017-11-30 02:47:16 sourceRead More
Amber – POC Reflective PE Packer 2 min read Pentest Tools Amber – POC Reflective PE Packer admin November 30, 2017 Amber is a proof of concept packer, it can pack regularly compiled PE files into reflective PE...Read More
Google detects Android Tizi Spyware that spies on popular apps like WhatsApp and Telegram 3 min read Malware Google detects Android Tizi Spyware that spies on popular apps like WhatsApp and Telegram admin November 30, 2017 Google identified a new family of Android malware dubbed Tizi spyware by using Google Play Protect, it spies...Read More
Data Analytics for Cyber Security & Software Licensing 1 min read Videos Data Analytics for Cyber Security & Software Licensing Belarc November 30, 2017 This short video will introduce you to our Data Analytics module and how to use it to...Read More
Lattices: from geometry to cryptography – Oded Regev 1 min read Videos Lattices: from geometry to cryptography – Oded Regev Institute for Advanced Study November 30, 2017 Ruth and Irving Adler Expository Lecture in Mathematics Topic: Lattices: from geometry to cryptography Speaker: Oded Regev...Read More
Rubica – Explainer Video 1 min read Videos Rubica – Explainer Video admin November 29, 2017 Rubica is real-time security and privacy protection service that works behind the scenes. Keeping you safe from...Read More
Demo of the Cobalt.io pentesting platform: detecting and reporting vulnerabilities 1 min read Videos Demo of the Cobalt.io pentesting platform: detecting and reporting vulnerabilities Pentester Academy TV November 29, 2017 Cobalt.io Co-Founder Esben Friis-Jensen demos the pentesting platform which allows organizations to work directly with pentesters. Based...Read More
Crowdsourced pentesting and bug bounties as a service with Esben Friis-Jensen of Cobalt.io 1 min read Videos Crowdsourced pentesting and bug bounties as a service with Esben Friis-Jensen of Cobalt.io Pentester Academy TV November 29, 2017 Crowdsourced security solutions, using pentesting teams and bug bounty programs, from Cobalt.io detect and evaluate system vulnerabilities...Read More
DeepSec 2017 – Behavior Based Secure And Resilient System Development 1 min read Videos DeepSec 2017 – Behavior Based Secure And Resilient System Development admin November 29, 2017 Dr. Muhammad Taimoor Khan (Alpen-Adria University, Klagenfurt, Austria) held his presentation about system development at DeepSec 2017....Read More