Menu

Articles of @neoslab

All articles written by @neoslab
How to Create a Keylogger for Linux using Python
How to Create a Keylogger for Linux using Python

Some recent studies estimate that between 100 to 150 million computers worldwide would be directly infected by at least one malware such as Trojan or Keylogger.

KeyloggerPythonKeystrokesEventsCrontabTrojan
Hacker Publishes 2TB of Data from Cayman National Bank
Hacker Publishes 2TB of Data from Cayman National Bank

A hacker, known as Phineas Fisher, has published more than 2TB of data from the Cayman National Bank. This includes more than 640,000 emails and the data of [...]

CaimanBankDataleakPhineas FisherHackingBreaches
Pipka Self-Cleaning Payment Malware Infects Ecommerce Sites
Pipka Self-Cleaning Payment Malware Infects Ecommerce Sites

The Pipka script, recently discovered by researchers at Visa is capable of self-destructing after executing its code on a website, making it very difficult to [...]

PipkaEcommerceSkimmerCobaltFIN6JavaScriptMalware
PureLocker the Multi-OS Ransomware Targeting Servers
PureLocker the Multi-OS Ransomware Targeting Servers

Researchers have discovered ransomware encoded in PureBasic, hence its name PureLocker. It is able to encrypt files on Windows, Linux, and Mac OS X and targets [...]

VirusBotnetNetworkPureLockerRansomWareCyber-Attack
Top 20 Most Used Hacking and Pentesting Tools
Top 20 Most Used Hacking and Pentesting Tools

Hacking Tools are programs and scripts that help hackers and security researchers find and exploit weaknesses in computer systems, web applications, servers [...]

NmapMetasploitBurpsuiteWiresharkAircrackTORHashcat
A variant of Zombieload flaw hits Intel's Newest Cascade Lake Chips
A variant of Zombieload flaw hits Intel's Newest Cascade Lake Chips

After Spectre and Meltdown, another vulnerability affects Intel processors. A variant of the Zombieland attack would target chips under micro-architecture [...]

ZombieloadSpectreMeltdownVulnerabilityFlawAttackXeon
Top 50 Hacking Terms Used in Cyber-Security
Top 50 Hacking Terms Used in Cyber-Security

One of the difficult part of writing and reading content about hacking and Cyber-Security is that it's a world full of jargon and technical terms.

CompilerDDoSDoxingKeyloggerRootkitZeroDay
How to use Ping Sweep to scan Networks and find Live Hosts
How to use Ping Sweep to scan Networks and find Live Hosts

In networking, a ping sweep is a network scanning method that can establish a range of IPs which map to live hosts. The most used tool to run a ping sweeps is [...]

NetworkScanningPingFpingGpingReconnaissance
MegaCortex Ransomware is now able to change Windows Password
MegaCortex Ransomware is now able to change Windows Password

Appearing on a growing number of networks during May 2019, MegaCortex ransomware seems to have evolved. It can now change the password of the current user [...]

MegaCortexCyber-AttackRansomWareVirusNetwork
The Bluekeep Exploit is back and is used to install Cryptominer
The Bluekeep Exploit is back and is used to install Cryptominer

Recently one Cyber-Security researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.

BlueKeepRDPCryptominerXMRMoneroWindowsVulnerability
Nemty Ransomware Expands Its Reach and Delivering Method
Nemty Ransomware Expands Its Reach and Delivering Method

The Nemty ransomware, initially detected in August 2019, has increased its reach by partnering up with the Trik botnet, which now delivers Nemty to compromised [...]

NemtyTrikBotnetWortrikUSBSkypeSMBRansomWare
French Police Removed RETADUP Malware from 850,000 PCs
French Police Removed RETADUP Malware from 850,000 PCs

The French Center for Combating Digital Crime, with the help of Avast Researchers, was able to dismantle a vast botnet of 850,000 machines during a large-scale [...]

CryptominerMalwareMoneroRetadumpWorm