By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Hacker tools and techniques: Underground hacking sites News
June 08, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the Shadow Brokers' monthly service for zero-day exploits and how it may affect enterprise security efforts.
May 25, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss Microsoft's sharp criticism of the NSA over the EternalBlue Windows vulnerability and WannaCry ransomware.
May 23, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors look at the devastation caused by the WannaCry ransomware worm and discuss how it could have been prevented.
April 28, 2017
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the latest round of Equation Group cyberweapons and how Microsoft patched them.
Hacker tools and techniques: Underground hacking sites Get Started
Bring yourself up to speed with our introductory content
Black hat refers to a hacker who breaks into a computer system or network with malicious intent. Continue Reading
A keylogger, sometimes called a keystroke logger or system monitor, is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard. Continue Reading
Owned, in common slang, means decisively defeated, with the implication of domination and possession. The term is often used to describe the results of competition in sports and business. Continue Reading
Evaluate Hacker tools and techniques: Underground hacking sites Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this excerpt of Cyber Guerilla, authors Jelle van Haaster, Ricky Gevers and Martijn Sprengers discuss the various roles hackers play. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss cyber attribution following the U.S. government's claim that Russia is behind recent state-sponsored cyberattacks. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the latest Symantec vulnerabilities reported by Google Project Zero and the Shadow Brokers' Cisco exploit. Continue Reading
Manage Hacker tools and techniques: Underground hacking sites
Learn to apply best practices and optimize your operations.
In part two of Risk & Repeat's podcast on the Equation Group, SearchSecurity editors discuss the zero-day vulnerabilities discovered in the Shadow Brokers' data dump. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss how a cyberextortion campaign is targeting enterprises that don't have official bug bounty programs. Continue Reading
The threat of an evil twin attack has plagued enterprises for years, and it's still not leaving. Expert Nick Lewis explains how to defend against evil twins. Continue Reading
Problem Solve Hacker tools and techniques: Underground hacking sites Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Attackers found a way to use Microsoft Application Verifier to hijack security products, like antivirus tools. Expert Judith Myerson explains how it's done and what to do to stop it. Continue Reading
Local Windows admins can perform session hijacking without passwords. Expert Judith Myerson explains how this type of attack works and what to include in a policy to prevent it. Continue Reading
Why nation-state attribution plays a major role in the U.S. government's willingness to share cyberthreat intelligence with private-sector companies. Continue Reading