CyberAttacks More Sophisticated

The attackers are getting better, they are not sitting still. If you are hoping no one will notice you in your personal world … not likely, everyone is a target. In this post lets connect a few dots: SCmagazine story:“Social Media and Engineering Used to spread tempted cedar spyware” So a fake Facebook profile method … Read more

Test your network by Bloodhound

Which Bloodhound might you ask? No not the Dog… But the following program in Kali Linux: Just a slightly different picture and meaning. Cobaltstrike has tested with it and this is his explanation: “BloodHound is a tool to analyze and understand Active Directory Trust Relationships. For an offensive practitioner, this tool can highlight the hops … Read more