Submit your search
Discovering the chain of fake crypto exchanges

2022 is the year for cryptocurrency and blockchain as more and more people are interesting to involve to different aspects of this new technology. While most of us are still exploring how it works, scammers have already found a million ways to make a profit — by creating fake cryptocurrency trading websites and fake crypto […]

Read More
Fake Telegram groups related to Proton XPR

Social media permeates the lives of many people – we use it to stay in touch, make new friends, shop, and have fun. But reports to the FTC show that social media is also increasingly where scammers go to con us. More than one in four people who reported losing money to fraud in 2021 said it started on social media with an ad, a post, or a message. In fact, the data suggest that social media was far more profitable to scammers in 2021 than any other method of reaching people.

Read More
How to use YARA rules to identify malware

YARA is an open-source tool designed to help malware researchers identify and classify malware samples. It makes it possible to create descriptions (or rules) for malware families based on textual and/or binary patterns. YARA is multi-platform, running on Linux, Windows and Mac OS X. It can be used through its command-line interface or from Python scripts with […]

Read More
How to set most secure permissions for your website

In Linux, file permissions determine the levels of privilege for file owners and everyone else. It’s important to make sure any web-facing files have their permissions set correctly, so that a compromised process can’t write to places it shouldn’t. Many articles will promote traditional way of setting permissions for your website, but from our experience […]

Read More
How to set up secure cron job

How do I install or create or edit my own cron jobs? To edit or create your own crontab file, type the following command at the UNIX / Linux shell prompt: crontab -e Do I have to restart cron after changing the crontable file? No. Cron will examine the modification time on all crontabs and […]

Read More
10 steps to properly secure SSH server

SSH is a secure, encrypted replacement for common login services such as telnet, ftp, rlogin, rsh, and rcp . It is strongly recommended that sites abandon older clear-text login protocols and use SSH to prevent session hijacking and sniffing of sensitive data off the network. Before you start with configuration of SSH, you need to […]

Read More

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram