credential stealer

2024-08-23

An infostealer or credential stealer is a type of malware that collects and transmits discovered credentials or other sensitive information to an ...

Read More

cyber crime

2024-08-23

Cybercrime is the act of using computers or computer networks to commit illegal acts.

Read More

honeypot

2024-08-23

In the realm of cybersecurity, a honeypot is a decoy system that mimics a legitimate target to lure attackers. Honeypots can be used for research, ...

Read More

most observed sshd backdoors shared the same rough feature set

2024-08-23

In sshbackdors-dumont2018, it was mentioned that most of the OpenSSH backdoor samples they observed in this report shared the same rough feature set: ...

Read More

sshbackdors-dumont2018

2024-08-23

The Dark Side of the ForSSHe - A landscape of OpenSSH backdoors

by Romain Dumont, Marc-Etienne M.Leveille, Hugo Porcher

ESET Research, December 2018 ...

Read More

UPX

2024-08-23

UPX is an executable packer that works on PE, ELF, and Mach-0 files. https://upx.github.io/

Read More

linuxapts-great2020

2024-08-22

An overview of targeted attacks and APTs on Linux

by GReAT team; Kaspersky Lab, September 10, 2020 ...

Read More

Amateur Radio

2024-08-21

Amateur radio (aka ham radio) is the use of the radio frequency spectrum for non-commercial purposes such as contesting, emergency communications, ...

Read More

linuxplus-breshahan2015

2024-08-21

CompTIA Linux+ Powered by Linux Professional Institute Study Guide - Third Edition

EXAMS LX0-103, LX0-104

by Christine Breshahan and Richard Blum ...

Read More

zettelkasten

2024-08-21

Zettelkasten (German word that translates to “note box”) is a note taking and knowledge management system that involves organizing ideas ...

Read More