Mobile Penetration Testing Masterclass

What is Mobile Penetration Testing? Nowadays,Mobile Penetration Testing can be considered as one of the important Penetration Testing that needed on any application or system. There have a few platform that available in the wild […]

IcedID trojan

What is IcedID and How it spread? IcedID is a new trojan that been found in the banking scene where it still in the first development. Similiar to Trickbox and Dridex, trojan called IcedID can […]

TOR bug

Recently, there have been found a bug in TOR whether using http or HTTPs that been triggered where it’s known as “TORMOIL” a members of TOR project have provided a temporary solution until the final […]

hashcat v4.0.0

What is Hashcat? Hashcat have release a new version which version 4.0.0 where there will a few new features that is implement inside it. For those who doesn’t know what is hashcat, hashcat is one […]

HTTP Public Key Pinning(PKP) removed from Chrome

Google have announced that HTTP Public Key Pinning will be removed and they plan to removed it on May 2018 which it will implement during Chrome 67 HTTP Public Key Pinning For those who doesn’t […]

Bad Rabbit Ransomware

Recently, there is a new ransomware have been caused problem to computer in Russia and Ukraine called “Bad Rabbit”. The Bad Rabbit Ransomware is using the similar method as previous ransomware which is NotPetya that […]

Reaper Botnet

A new botnet called “Reaper” have been notice as a massive issues since middle of September this year. This new botnet “Reaper” is basically is been made up of a few things such as IP-Based […]

SSH-Audit

As people have notice, there have a new version of the Kali Linux that just came out recently. One of the new tools that added into the repositories is SSH-Audit. For those are not have […]

IPv10 Draft Specification

It’s been since December last year that we heard about the IPv10 and now finally we can see the draft of IPv10 available in the wild. How it works? As the name suggest, anybody with […]

Chkrootkit

To check and analyze the rootkit in a computer, there is a lot of tools that perform and one of them are chkrootkit. Normally, its hard to find a single rootkit in the computer because […]