Looking for something else?
Hacker Tools and Techniques: Underground Sites and Hacking Groups News
September 17, 2015
There is a growing concern for cyberespionage in U.S. after a financially motivated hacker group stole inside information to make millions from insider trading schemes.
September 16, 2015
A new report details how attackers can fly under the radar by using stolen credentials in order to avoid breach detection and forgoing the use of malware in malicious activity.
August 05, 2015
Cybercrime has developed substantially due to bulletproof hosting service efficiency. Trend Micro's report explains how and why these services evade law enforcement officials and remain online.
July 31, 2015
The recently shutdown Darkode cybercriminal community has been rebuilt, and claims the administrators are intact and security will be tightened to better avoid law enforcement.
Hacker Tools and Techniques: Underground Sites and Hacking Groups Get Started
Bring yourself up to speed with our introductory content
Cyberextortion is a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack. Continue Reading
A hardware vulnerability is an exploitable weakness in a computer system that enables attack through remote or physical access to system hardware. Continue Reading
A watering hole attack targets a specific group of users by infecting websites group members like to visit. The name watering hole attack is inspired by predators in the natural world who lurk near watering holes, looking for opportunities to attack... Continue Reading
Evaluate Hacker Tools and Techniques: Underground Sites and Hacking Groups Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Lethal threats to enterprise information security are emerging from every which way. This ISM Insider Edition looks at what security professionals are up against: state-sponsored attacks, the rise of hacking via social media, and the spread ... Continue Reading
Expert Michael Cobb explains how reverse engineering can be made more difficult with an approach called Hardened Anti-Reverse Engineering System or HARES. Continue Reading
Video: Some new hacking trends have security professionals worried, including Robert "RSnake" Hansen, who notes the speed and motivation of today's attackers. Continue Reading
Manage Hacker Tools and Techniques: Underground Sites and Hacking Groups
Learn to apply best practices and optimize your operations.
Learn about the 'hacking as a service' and other emerging security threats. Continue Reading
New roundup: Sometimes the least of threats -- such as click fraud -- can end up being the bigger issues -- like ransomware. Plus: U.S. Navy won't let go of XP; U.S./China cyber code of conduct; and more! Continue Reading
It's a fact of life: Windows systems get hacked. In this tip, expert Nick Lewis discusses multiple Windows command-line tools to help enterprises discover if their system has been compromised. Continue Reading
Problem Solve Hacker Tools and Techniques: Underground Sites and Hacking Groups Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The NSA's top-secret Tailored Access Operations offensive hacking unit offers enterprise defense strategy lessons. Expert Nick Lewis discusses. Continue Reading
Expert Nick Lewis explains the logic behind the 'Bouncer' attack toolkit and its seemingly contradictory use of whitelisting security methods. Continue Reading
Enterprise threats expert Nick Lewis explores how analysis of a newly discovered APT tool, PinkStats, may help enterprise APT defense. Continue Reading