
How to OSINT
- Frank
- June 2, 2023
- ali
- an0n
- an0n ali
- email osint
- ethical hacking
- Facebook OSINT
- Facial Recognition
- find information
- find information by phone number
- find information from email address
- gather info
- gather information
- hacking
- how to
- Instagram OSINT
- kali linux
- open source intelligence
- OSINT
- osint framework
- osint tools
- osintgram
- phone osint
- pimeyes
- Twitter OSINT
an0n ali walks us through the wonderful world of OSINT, or Open Source Intelligence
Read More
DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)
In this video, Flashback Team will tell you the story of how we found CVE-2020-10881 in the Pwn2Own Tokyo 2019 hacking competition and present our Game Plan for exploiting it.
Read More
Twitter Hacker Faces 77 Years in Prison
This video from Seytonic covers the latest in security news. Sources: https://www.hackread.com/british-hacker-guilty-hacking-schemes/ https://www.bleepingcomputer.com/news/security/hacker-plugwalkjoe-pleads-guilty-to-2020-twitter-breach/ https://thehackernews.com/2023/05/mastermind-behind-twitter-2020-hack.html https://www.darkreading.com/attacks-breaches/twitter-hacker-cops-to-cybercrimes-extradited-to-us-for-trial- https://go.theregister.com/feed/www.theregister.com/2023/05/10/guilty_plea_twitter_o_connor_case/ https://therecord.media/twitter-hack-guilty-plea-sim-swapping-cyberstalking https://www.justice.gov/opa/pr/uk-citizen-extradited-and-pleads-guilty-cyber-crime-offenses https://www.justice.gov/opa/pr/man-arrested-connection-alleged-role-twitter-hack https://www.nytimes.com/2020/07/17/technology/twitter-hackers-interview.html?action=click&module=Top https://www.justice.gov/usao-ndca/press-release/file/1413571/download https://krebsonsecurity.com/2021/07/plugwalkjoe-does-the-perp-walk/ https://arstechnica.com/tech-policy/2021/03/i-was-a-teenage-twitter-hacker-graham-ivan-clark-gets-3-year-sentence/
Read More
Magecart Hackers Perfect Fake Checkout Pages
This video is from Seytonic. Sources: https://www.bleepingcomputer.com/news/security/hackers-swap-stealth-for-realistic-checkout-forms-to-steal-credit-cards/ https://www.malwarebytes.com/blog/threat-intelligence/2023/04/kritec-art https://ico.org.uk/media/action-weve-taken/mpns/2618421/ba-penalty-20201016.pdf
Read More
How Spyware is Exploiting Calendar Apps to Hack iPhones
This video from Seytonic explores a massive hole in iPhone security. Sources: https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/ https://www.hackread.com/quadream-israeli-cyber-mercenary-iphone-hacks/ https://www.microsoft.com/en-us/security/blog/2023/04/11/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia/ https://www.bleepingcomputer.com/news/security/iphones-hacked-via-invisible-calendar-invites-to-drop-quadream-spyware/ https://securityaffairs.com/144723/malware/quadream-spyware.html https://www.darkreading.com/vulnerabilities-threats/microsoft-nso-group-like-quadream-actor-selling-mobile-spyware-governments https://thehackernews.com/2023/04/israel-based-spyware-firm-quadream.html https://therecord.media/israeli-spyware-company-quadream-surveilling-journalists https://www.cyberkendra.com/2023/04/quadream-spyware-used-to-target.html https://www.calcalistech.com/ctechnews/article/hy78kiym2
Read More
3CX: How this malware almost hacked every business
- Frank
- April 19, 2023
- 3CX Hacked
- 3CX Malware
- anti malware
- antivirus
- best antivirus
- best EDR
- best internet security
- computer security
- cyber insurance
- cyber security
- Cybersecurity
- cybersecurity degree
- EDR
- hack
- hacking
- infostealer
- internet security
- learn cybersecurity
- malware hacked everyone
- most dangerous malware
- PUP
- Ransomware
- Security
- Technology
- The Malware that hacked every business
- The PC Security Channel
- TPSC
- trojan
- virus
The PC Security Channel highlights 3CX: A popular phone system software for VOIP was hit by a supply chain attack, with the original source serving malware infected installers.
Read More
How Did the FBI Caught Hacker Pompompurin?
Another great video from Seytonic. Sources: https://thehackernews.com/2023/03/breachforums-administrator-baphomet.html https://thehackernews.com/2023/03/breachforums-administrator-baphomet.html https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/ https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/ https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/ https://therecord.media/breachforums-arrest-new-administrator https://www.darkreading.com/threat-intelligence/cops-nab-breachforums-boss-new-york https://go.theregister.com/feed/www.theregister.com/2023/03/20/in_brief_security/ https://regmedia.co.uk/2023/03/17/breachforums.pdf
Read More
3 HACKING gadgets you have to TRY!!
In this video, NetworkChuck shows you how to create 3 hacking projects with a Raspberry Pi Zero W (Raspberry Pi 0 W). These projects include the P4wnP1 A.L.O.A., the pwnagotchi and Kali Linux.
Read More
illegal Phone Tracking Exposed
Seytonic exposes US Gov’s illegal Phone Tracking. Sources: https://www.theregister.com/2023/03/04/dhs_secret_service_ice_stingray/ https://www.eff.org/deeplinks/2023/03/report-ice-and-secret-service-conducted-illegal-surveillance-cell-phones https://www.oig.dhs.gov/sites/default/files/assets/2023-03/OIG-23-17-Feb23-Redacted.pdf https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/ https://www.engadget.com/2018-06-08-fcc-shrugs-at-fake-cell-towers-around-the-white-house.html https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/ https://www.hackread.com/bidencash-leaks-2-million-credit-cards/ https://cybernews.com/news/bidencash-leaks-millions-payment-cards/ https://www.paymentsjournal.com/bidencash-credit-card-leak-strikes-again/ https://blog.cyble.com/2023/03/01/over-2-million-cards-leaked-by-bidencash/ https://www.bleepingcomputer.com/news/security/chick-fil-a-confirms-accounts-hacked-in-months-long-automated-attack/ https://apps.web.maine.gov/online/aeviewer/ME/40/66699dcb-5f86-40bb-9d12-d64dea06faca.shtml
Read More
What is PsyOps? Darknet Diaries Explores
This video is from Jack Rhysider. PSYOPs, or “Psychological Operations” are happening all around us, 24/7. Sometimes they’re used in warfare against foreign enemies, and sometimes we know them by different names: Marketing, PR, spin, and propaganda. This is the story about information being weaponized for good and shady ends.
Read More