Data, Security


What is Big Data? A new generation of technologies and architectures, designed to economically extract insight from very large volume of data both structured and unstructured that leads to better decisions and strategic business moves. Most of the data that wants to be analyzed contains sensitive information, and that’s why it relates to us as security practitioners. The data is…

Continue Reading

Cryptocurrency, Malware

Cryptocurrency-Mining Malware: A new Business Model for Cyber Offenders

The growing popularity of Bitcoin and other cryptocurrencies is driving curiosity among the hackers. 2017 was the year of high profile breaches and ransomware attacks where as a result bitcoin had a tremendous price hike. Hackers launched global ransomware attacks where the payments were demanded in bitcoins Like many people, hackers on message board hack forums are trading tips on…

Continue Reading

hackthebox invite code picture

CTF::HacktheBox: Invite Code

How to approach it ? doesn’t allow you to register. The only way to sign up is by having an insider to provide you with an invite code or hack your way in. I don’t have someone to provide me an invite code so I have to hack me way in. I start off by analyzing the source code…

Continue Reading