By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Hacker tools and techniques: Underground hacking sites News
December 22, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the rising threat of cryptojacking and how hackers can steal computing power from unsuspecting users.
December 14, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the recent bitcoin boom and how the cryptocurrency's rising value could affect the cybersecurity landscape.
October 17, 2017
Researchers discover a WPA2 vulnerability and brand it KRACK, but some experts say the early reports overstate the risk of the flaw and downplay the difficulty of an exploit.
September 28, 2017
A security researcher describes the network lateral movement process from an attacker's perspective and a few key points of focus for IT pros, at DerbyCon.
Hacker tools and techniques: Underground hacking sites Get Started
Bring yourself up to speed with our introductory content
According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by ... Continue Reading
Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another nation-state. Continue Reading
A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. Continue Reading
Evaluate Hacker tools and techniques: Underground hacking sites Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this excerpt of Cyber Guerilla, authors Jelle van Haaster, Ricky Gevers and Martijn Sprengers discuss the various roles hackers play. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss cyber attribution following the U.S. government's claim that Russia is behind recent state-sponsored cyberattacks. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the latest Symantec vulnerabilities reported by Google Project Zero and the Shadow Brokers' Cisco exploit. Continue Reading
Manage Hacker tools and techniques: Underground hacking sites
Learn to apply best practices and optimize your operations.
A vast majority of APT attacks and malware delivery happens via spear phishing. But worms have always had a place in the toolkit when the delivery method fit the mission. Continue Reading
In part two of Risk & Repeat's podcast on the Equation Group, SearchSecurity editors discuss the zero-day vulnerabilities discovered in the Shadow Brokers' data dump. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss how a cyberextortion campaign is targeting enterprises that don't have official bug bounty programs. Continue Reading
Problem Solve Hacker tools and techniques: Underground hacking sites Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A new version of the Ursnif Trojan uses mouse movements to bypass security efforts by beating sandbox detection. Expert Matthew Pascucci explains how this technique works. Continue Reading
A new POS malware downloads a RAM scraper to avoid detection. Expert Nick Lewis explains the tricks MajikPOS uses to target retail terminals and how to defend against it. Continue Reading
Attackers found a way to use Microsoft Application Verifier to hijack security products, like antivirus tools. Expert Judith Myerson explains how it's done and what to do to stop it. Continue Reading