Skip to the content
Hacktive Security Blog
  • Pin Posts
  • Home
  • 2023

2023

0
8
Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 2)
Active Directory

Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 2)

calfcrusher
November 15, 2023November 15, 2023
DISCLAIMER - This article is provided for educational and informational purposes only. The techniques, tools, and examples discussed are intended to promote a better understanding...
Read More
0
3
Security VS Corporate Management
GRC

Security VS Corporate Management

Angelo Chiarot
September 13, 2023September 13, 2023
The devil and holy water  THE SITUATION  Having had the opportunity to observe a few hundred companies over the past 30 years, to date there...
Read More
0
12
Unveiling the Hidden Threat: Dissecting a Malware on PyPI repository (Part 1)
Active Directory

Unveiling the Hidden Threat: Dissecting a Malware on PyPI repository (Part 1)

calfcrusher
August 2, 2023November 15, 2023
In the vast realm of software development, the Python Package Index has long been a trusted repository for Python packages. However, even the most reliable...
Read More
0
4
๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Matteo Lucchetti โ€“ Penetration Tester/Red Teamer
Meet The Team

๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Matteo Lucchetti โ€“ Penetration Tester/Red Teamer

Matteo Lucchetti
June 20, 2023June 20, 2023
I miei primi approcci nel campo dell'informatica risalgono circa alla fine degli anni '90. Avevo poco piรน di cinque anni quando ho iniziato a mettere...
Read More
0
21
Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)
Red Teaming

Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)

calfcrusher
June 5, 2023June 6, 2023
DISCLAIMER - This article is provided for educational and informational purposes only. The techniques, tools, and examples discussed are intended to promote a better understanding...
Read More
0
0
๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Enrico Ingenito – Sales Manager
Meet The Team

๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Enrico Ingenito – Sales Manager

o___o
April 19, 2023April 20, 2023
Il mio percorso professionale รจ iniziato nel mondo delle TLC nel 1983, tra le braccia della Mamma dei Fili nazionale: da lรฌ in poi ho...
Read More
0
3
Hacking the Dutch government
Uncategorized

Hacking the Dutch government

Michele Mariani
April 5, 2023April 20, 2023
A few months ago I found out that the dutch government is hosting a bug-bounty program that covers a lot of assets from their infrastructures....
Read More

Recent Post

Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 2)

Security VS Corporate Management

Unveiling the Hidden Threat: Dissecting a Malware on PyPI repository (Part 1)

๐Ÿ‡ฎ๐Ÿ‡น Conosciamo Matteo Lucchetti โ€“ Penetration Tester/Red Teamer

Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)

Top Category

Application Security

Mobile

Exploitation

  • Pin Posts
Copyright © 2023 Hacktive Security Blog. All rights reserved.
Theme: Masonry Grid By Themeinwp. Powered by WordPress.
To the Top ↑ Up ↑