KSN Report: Ransomware in 2016-2017

This report has been prepared using depersonalized data processed by Kaspersky Security Network (KSN). The metrics are based on the number of distinct users of Kaspersky Lab products with the KSN feature enabled, who encountered ransomware at least once in a given period, as well as research into the ransomware Read more…

 166 total views,  1 views today

chkrootkit

Malware & Rootkit detection on Linux   Although the Linux system can be protected from the spread of most malware, it is not absolutely safe. If your data center erected a Linux server, especially the Web server, you should be on the rootkit Trojans and malicious software to prevent, because Read more…

 157 total views,  1 views today

Major Update of Acunetix Online

Major Update of Acunetix Online   Acunetix Online has undergone a mammoth update, now enjoying all the features and benefits found in Acunetix On Premise, including: Integrated vulnerability management, greater manageability of threats and targets and the integration of popular WAFs and Issue Tracking systems. Acunetix Online also features a Read more…

 163 total views

Tools Category

NETATTACK 2

An Advanced Wireless Network Scan and Attack Script     NETATTACK 2 is a python script that scans and attacks local and wireless networks. Everything is super easy because of the GUI that makes it unnecessary to remember commands and parameters. FUNCTIONS SCAN-FUNCTIONS Scan for Wi-Fi networks Scan for local Read more…

 155 total views

HoneyPot & HoneyNet

Virtual attack and defense system   A honeypot is a term used to describe a computer or network setup with the purpose of attracting computer hackers. These computers allow a system administrator or security expert to analyze how a computer hacker may attempt to hack a network without risking the Read more…

 96 total views

Tools Category

Hydra 8.5

Network Logon Cracker   A very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possiblity to show how easy it would be to gain unauthorized access from remote to a system. There are already Read more…

 106 total views