Submit your search
2022-06-05
Browser In The Browser (BITB) Attack

A novel phishing technique called browser-in-the-browser (BitB) attack can be exploited to simulate a browser window within the browser in […]

Read More
2022-06-05
CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability "Follina"

Description A vulnerability has been discovered in Microsoft Support Diagnostic Tool (MSDT) which could allow for arbitrary code execution. MSDT […]

Read More
2022-05-29
Exposed! How scammers steal crypto private keys?

We must say that by the time of our researching crypto scams, we have witnessed that methods of these scammers are getting more and more sophisticated, and that's why we advise all users to be extra cautious when they engage with something unusual/unverified.

Read More
2022-05-27
Discovering the chain of fake crypto exchanges

2022 is the year for cryptocurrency and blockchain as more and more people are interesting to involve to different aspects […]

Read More
2022-05-23
How to use YARA rules to identify malware

YARA is an open-source tool designed to help malware researchers identify and classify malware samples. It makes it possible to create descriptions […]

Read More
2022-05-22
How to set most secure permissions for your website

In Linux, file permissions determine the levels of privilege for file owners and everyone else. It’s important to make sure […]

Read More
1 10 11 12 13 14 17

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
ALVOSEC
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram