top of page
Search
ADVISOR BM
Aug 19, 20242 min read
Unpatched Office vulnerability exposes NTLM hashes
Microsoft has warned of a vulnerability affecting various versions of Office that could expose NTLM hashes to a remote attacker. The...
4 views0 comments
ADVISOR BM
Aug 9, 20242 min read
Warning, beware! DeerStealer infostyler is distributed under the guise of Google Authenticator.
Warning, beware! DeerStealer infostyler is distributed under the guise of Google Authenticator. Google has fallen victim to its own advertis
8 views0 comments
ADVISOR BM
Aug 9, 20243 min read
🪙OSINT - Cryptocurrency Research 2024.
OSINT - Cryptocurrency Research 2024.
203 views0 comments
Marcus Hellberg
Aug 3, 20246 min read
Converting a website into a PWA
Converting a website into a PWA
21 views0 comments
ADVISOR BM
Jul 14, 202421 min read
Hamster Kombat. How much will you really make? The whole truth. Big breakdown of the project, HMSTR token and the team.
Hamster Kombat. How much will you really make? The whole truth. Big breakdown of the project, HMSTR token and the team.
30 views0 comments
ADVISOR BM
May 25, 202411 min read
Exploits and vulnerabilities in the second quarter of 2024
Exploits and vulnerabilities in the second quarter of 2024.
In this report, we will showcase a number of interesting statistical and analyti
15 views0 comments
ADVISOR BM
May 12, 20247 min read
QUIC: the communication protocol of the future or the road to nowhere.
QUIC: the communication protocol of the future or the road to nowhere.
0 views0 comments
ADVISOR BM
May 12, 20242 min read
Google urgently calls for Chrome to be updated after zero-day vulnerability discovered.
Google urgently calls for Chrome to be updated after zero-day vulnerability discovered.
17 views0 comments
ADVISOR BM
Jan 26, 20248 min read
Cybersecurity 2024, nine major trends.
9 cybersecurity trends for 2024
28 views0 comments
ADVISOR BM
Jan 25, 20242 min read
Hackers master artificial intelligence: the new FraudGPT is perfect for writing phishing emails.
The emergence of generative AI models has dramatically changed the cyber threat landscape. A recent analysis of the activity on darknet...
35 views0 comments
ADVISOR BM
Jan 25, 20246 min read
12 Cool Crypto Project Marketing Campaign Examples
Despite crypto being the new buzzword, many people chicken out when taking action. That’s why marketing crypto products or services is...
23 views0 comments
ADVISOR BM
Dec 26, 202310 min read
Bitcoin Ordinals under the hood. How Inscriptions and BRC20 workIntroduction.
Bitcoin Ordinals under the hood. How Inscriptions and BRC20 workIntroduction.
What is BRC20?
BRC20
makes it possible for tokens to appear
27 views0 comments
ADVISOR BM
Oct 15, 20232 min read
CISA warns of vulnerabilities and misconfigurations exploited in ransomware attacks.
CISA warns organizations of vulnerabilities and misconfigurations that are known to be exploited in ransomware operations. The US...
20 views1 comment
ADVISOR BM
Oct 15, 20231 min read
A NEW TOOL TO TRACK AND ANALYZE THE ACTIVITY OF RANSOMWARE GROUPS FROM OUR PARTNERS RANSOMLOOKER.
Ransomlooker, a tool to monitor ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide. The...
22 views0 comments
Resecurity
Oct 15, 20238 min read
How cyber threat actors coordinate PSYOPS campaigns and kinetic warfare, cyber attacks, consequences
#OpIsrael, #FreePalestine And #OpSaudiArabia - How Cyber-Threat Actors Coordinate PSYOPS Campaigns With Kinetic Military Actions The...
53 views0 comments
ADVISOR BM
Sep 26, 20235 min read
Businesses need to know this or the basics of information security!
In this article, I would like to talk about information that needs to be protected from attackers planning to harm your business. Please...
19 views0 comments
ADVISOR BM
Sep 18, 20234 min read
How can you incorporate social engineering into an investigation?
How can you incorporate social engineering into an investigation?
his article is about IPLogger and other little tricks ........
40 views0 comments
ADVISOR BM
May 1, 20232 min read
Europol warns of criminal use of ChatGPT.
EU police body Europol warned about the potential abuse of systems based on artificial intelligence, such as the popular chatbot ChatGPT, fo
25 views0 comments
ADVISOR BM
May 1, 20232 min read
White hat hackers showed how to take over a European Space Agency satellite
This week, during the third edition of CYSAT, the European event dedicated to cybersecurity for the space industry, the European Space Agenc
17 views0 comments
ADVISOR BM
May 1, 202311 min read
STYX Marketplace Emerged In Dark Web Focused On Financial Fraud
Resecurity has identified the newly launched STYX Marketplace which focuses primarily on financial fraud, money laundering, and identity the
43 views0 comments
bottom of page