Remove Computer and Electronics Remove Government Remove Study
article thumbnail

Scraping the TOR for rare contents

Security Affairs

First of all you need an exceptional computational power (RAM mostly) for letting multiple runners grab web-pages, extracting new links and re-run the scraping-code against the just extracted links. I am a computer security scientist with an intensive hacking background. Scraping the “TOR hidden world” is a quite complex topic.

article thumbnail

Cyber Threats Observatory Gets Improvements

Security Affairs

Collecting everything coming from their execution and clustering on strings similitude would highlight several stereotypes that would be interesting for further studies or similitude blocking lists. Studying stereotypes would be useful to analyze similarities in clusters. The following image shows the current deployment state.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

When you press the power button you are providing the right power to every electronic chips who needs it. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. How the PC boot process works ? Used tools.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. prison system and deported back to Vietnam, Ngo is currently finishing up a mandatory three-week COVID-19 quarantine at a government-run facility. Secret Service.

article thumbnail

Iranian Threat Actors: Preliminary Analysis

Security Affairs

Nowadays Iran’s Cybersecurity capabilities are under the microscope, experts warn about a possible infiltration of the Iranian government. agencies and security experts warn about a possible cybersecurity infiltration from Iranian government and alert to increase cybersecurity defensive levels.

article thumbnail

Hacking The Hacker. Stopping a big botnet targeting USA, Canada and Italy

Security Affairs

Now, I was able to download the entire Command and Control Source Code (php) and study it ! The study of this brand new C2 took me to the next level. Thanks to the source code study has been possibile to found more 0Days to be used against C2 and in order to break into the C2 level_2. Reverse Shell On C2 Stage_1.

article thumbnail

Writing Your First Bootloader for Better Analyses

Security Affairs

When you press the power button you are providing the right power to every electronic chips who needs it. I am a computer security scientist with an intensive hacking background. I do have a MD in computer engineering and a PhD on computer security from University of Bologna. How the PC boot process works ? Used tools.