credential stealer
2024-08-23
An infostealer or credential stealer is a type of malware that collects and transmits discovered credentials or other sensitive information to an ...
Read More
cyber crime
2024-08-23
Cybercrime is the act of using computers or computer networks to commit illegal acts.
Read More
honeypot
2024-08-23
In the realm of cybersecurity, a honeypot is a decoy system that mimics a legitimate target to lure attackers. Honeypots can be used for research, ...
Read More
most observed sshd backdoors shared the same rough feature set
2024-08-23
In sshbackdors-dumont2018, it was mentioned that most of the OpenSSH backdoor samples they observed in this report shared the same rough feature set: ...
Read More
sshbackdors-dumont2018
2024-08-23
The Dark Side of the ForSSHe - A landscape of OpenSSH backdoors
by Romain Dumont, Marc-Etienne M.Leveille, Hugo Porcher
ESET Research, December 2018 ...
Read More
UPX
2024-08-23
UPX is an executable packer that works on PE, ELF, and Mach-0 files. https://upx.github.io/
Read More
linuxapts-great2020
2024-08-22
An overview of targeted attacks and APTs on Linux
by GReAT team; Kaspersky Lab, September 10, 2020 ...
Read More
Amateur Radio
2024-08-21
Amateur radio (aka ham radio) is the use of the radio frequency spectrum for non-commercial purposes such as contesting, emergency communications, ...
Read More
linuxplus-breshahan2015
2024-08-21
CompTIA Linux+ Powered by Linux Professional Institute Study Guide - Third Edition
EXAMS LX0-103, LX0-104
by Christine Breshahan and Richard Blum ...
Read More
zettelkasten
2024-08-21
Zettelkasten (German word that translates to “note box”) is a note taking and knowledge management system that involves organizing ideas ...
Read More