New & Notable
Hacker Tools and Techniques: Underground Sites and Hacking Groups News
August 06, 2014
At Black Hat USA 2014, keynote speaker Dan Geer said bounding system dependencies was only hope for managing the risks of complexity.
July 15, 2014
Video: BeyondTrust's Marc Maiffret explains why simple attacks are often more effective than advanced threats.
April 10, 2014
The NSA's top-secret Tailored Access Operations offensive hacking unit offers enterprise defense strategy lessons. Expert Nick Lewis discusses.
March 18, 2014
Researchers at the 2014 Pwn2Own contest bypassed application sandboxing repeatedly, proving even the most secure applications can be vulnerable.
Hacker Tools and Techniques: Underground Sites and Hacking Groups Get Started
Bring yourself up to speed with our introductory content
Pre-installed malware is malicious software that is put on a machine before it is delivered to the user. New devices are usually assumed to be uncompromised but there are numerous reports of malware existing on new hardware. Continue Reading
A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge. Just as in the traditional botnet, which includes a command-and-control server, the bots are ... Continue Reading
A botnet topology is the network structure by which botnet interconnections are organized. Botnet topologies may be either centralized around a command and control server (C&C server) or decentralized using peer-to-peer (P2P) communication. Continue Reading
Evaluate Hacker Tools and Techniques: Underground Sites and Hacking Groups Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Joseph Granneman offers advice to enterprise security teams on using open source intelligence tools to learn about potential threats. Continue Reading
ADC vendor A10 Networks announces the Thunder TPS, an anti-DDoS appliance for enterprises and service providers. Continue Reading
Enterprise threats expert Nick Lewis explores how analysis of a newly discovered APT tool, PinkStats, may help enterprise APT defense. Continue Reading
Manage Hacker Tools and Techniques: Underground Sites and Hacking Groups
Learn to apply best practices and optimize your operations.
Attackers may be able to use Windows crash data to find their targets' weaknesses, but enterprises can turn the tables via better anomaly detection. Continue Reading
Industry expert Nick Lewis outlines the growing popularity of AutoIt script code in malware attacks and how to defend against these attacks. Continue Reading
In this issue, find out who won this year's Readers' Choice Awards. Also learn about threat management best practices and how hacktivists are impacting the threat landscape. Continue Reading
Problem Solve Hacker Tools and Techniques: Underground Sites and Hacking Groups Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Nick Lewis explains the logic behind the 'Bouncer' attack toolkit and its seemingly contradictory use of whitelisting security methods. Continue Reading
Expert Joe Granneman explains how steganography works, and the ways it can both protect and threaten enterprise data. Continue Reading
Expert Brad Casey explains advanced evasion techniques and details how to protect enterprise networks against the likelihood of an AET attack. Continue Reading