BlogHide Resteemsresteemedneuromancer (51)in technology • 7 years agosteemCreated with Sketch.⚠️ That's no font! HoeflerText attack switches from ransomware to RAT ⚠️A recent malware campaign targeting Google Chrome & Firefox has just switched gears; instead of afflicting victims' systems with Locky ramsomware it now installs a RAT (Remote Access Tool…resteemedcoinidol (56)in cryptocurrency • 7 years agoMeet Hacken, The First Decentralized Marketplace For White Hat HackersHacken, the cybersecurity marketplace for bug bounties, announces its token sale, scheduled for 12 October, 2017. The project aims to create a collaborative defense ecosystem for White Hat Hackers…pwnedu (39)in hacking • 7 years agoCovering Tracks on Windows - Link DumpWindows Post Exploitation - Covering Your Tracks My last link dump contained materials covering Windows Privilege Escalation. A logical next step would be to hide the evidence that you were on the…resteemedjamesburchill (28)in selfies • 7 years agoHow To Hack LinkedIn Using Google (And Find Anyones Name Using Their Selfie)In this short video I show you how to use Google's image search to hack LinkedIn profiles so you can find the names of people "hiding" from you. Have fun! WARNING Once you've learned this…pwnedu (39)in hacking • 7 years agoWindows Privilege Escalation ResourcesExploits BHaFSec's Window Privilege Escalation [This is GOLD] - DeleteExpiredTaskAfter - Tools PowerUp - Sysinternals Suite - FolderPermissions.ps1 -…resteemedodinthelibrarian (54)in news • 7 years agoThe Arrest of MalwareTech (Marcus Hutchins)The Arrest of MalwareTech (Marcus Hutchins) [EDIT] Donations For MalwareTech's Legal Fees Can Be Made HERE. I've been putting off this post for a while, for various reasons. Immediately after…resteemedo1o1o1o (55)in security • 7 years agoFuzzer project finds secret instructions on Intel processorsThe sandsifter project has found undocumented Intel x86 processor instructions that have been kept secret by Intel. It does this by testing millions of instruction op codes and seeing what…pwnedu (39)in python • 7 years agoSteemit Forensics with PythonAbout a week ago, @JacKeown posted a thread titled Steemit-Trail Conspiracy?! which discusses a large number of upvotes and high curation rewards very quickly. In the comments, we discussed the…pwnedu (39)in linux • 7 years agoHow do you change your DNS settings in Linux/Windows?If you did not catch my post of information security job interview questions, you might want to give it a quick glance. While the majority of questions are security oriented, it really is a helpful…resteemedhallow (51)in technology • 7 years agoSteganography - Hide important documents in imagesSo you probably wonder a lot of times where you should store your passwords or all those codes and pins that you only need so often... Why not hide all that in an image or images, yeah it might not…resteemedsomecoolname (55)in technology • 7 years agoDEF CON Hacking Conference - Las Vegas 2017Image from DEF CON 25, the 25th addition to the hacking conference held in Las Vegas, will take place between July 27th - 30th at Caesars Palace. The entrance fee is $260 and amongst the…pwnedu (39)in asksteemit • 7 years agoAre open-source projects more or less secure than proprietary ones?I just recently posted on my blog a long list of information security job interview questions. My intentions were, and still are, to begin sharing MY answers to those questions, but before I…resteemedvoidfire (35)in technology • 7 years agoFor those who want to be a hacker but have no idea where to startA hands-on post aimed at giving you the exposure and the experience you need to get started. I’ll guide you through the process of creating a virtual lab and setting up the tools to start hacking…pwnedu (39)in security • 7 years agoInformation Security Job Interview QuestionsInfoSec Job Interview Questions. At least try to be prepared.Job interviews are always nerve wracking. When it comes to the InfoSec industry, they can be even more so. The questions can range from…resteemeddocdelux (61)in conspiracy • 7 years agoTHE GREY WORLD ORDER - How the "education" system breeds sameness - And the great "like" conspiracy“What did one mirror see in the other? Nothing.” ~ Khang Kijarro Nguyen I present here a gift to my fellow millennials, a look into the structure of the mind control of our generation. There is…resteemedwealthyhustler (42)in news • 7 years agosteemCreated with Sketch.LINKIN PARK LEAD VOCALIST CHESTER BENNINGTON CONFIRMED DEADFYI: I know Wealthy Hustler covers money-making news, reviews, guides, and motivational topics, but we are huge fans of Linkin Park, so we had to post this. This is a very moment for all Link Park…resteemedv4vapid (72)in weapons-smuggling • 7 years agoAnonymous Bulgaria - "Silkway Airlines Helps Terrorists" - New 313Mb RAR File LeakAnonymous Bulgaria Twitter: The Data Dump details an enormous illegal weapons smuggling operation from Eastern European countries to destinations throughout the middle east. A number of…pwnedu (39)in hacking • 7 years agoThe Conscience of a Hacker - Written on January 8, 1986Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in…resteemedmrosenquist (70)in security • 7 years agosteemCreated with Sketch.The Next Cybersecurity ChallengeRole Change: AI Cybersecurity Strategist I am excited to announce I am taking a new role in cybersecurity. Always in pursuit of great thought-leadership challenges in the cybersecurity domain, I…pwnedu (39)in technology • 7 years ago6 Damaging things entrly-level cybersecurity job-seekers doWe have all heard that the number of "Cyber Security" job-openings continues to outpace the number of job-seekers. While we do continue to see the number of infosec professionals growing, many are…