black market

Search engines reconnaissance – The magic weaponsSearch engines reconnaissance – The magic weapons

Search engines reconnaissance – The magic weapons

Search engines are formidable tools for reconnaissance, Google Hacking is essential knowledge for professionals searching for website vulnerabilities. Search engines…

12 years ago
The Silk Road black market reloaded … 2.0 is out!The Silk Road black market reloaded … 2.0 is out!

The Silk Road black market reloaded … 2.0 is out!

A new version of the popular black market Silk Road has been launched, the greatest illegal marketplace on Tor network…

12 years ago
Google hacking – Automated website hacking tools based on Google dorksGoogle hacking – Automated website hacking tools based on Google dorks

Google hacking – Automated website hacking tools based on Google dorks

Google Hacking is a formidable method for reconnaissance. Mass website hacking tools based on Google-dorks advantage the malicious online activities.…

12 years ago
Twitter Unrestricted File Upload VulnerabilityTwitter Unrestricted File Upload Vulnerability

Twitter Unrestricted File Upload Vulnerability

Security expert Ebrahim Hegazy has found another serious vulnerability in Twitter, he has discovered an Unrestricted File Upload Vulnerability. The…

12 years ago
Silk Road online drug marketplace sized by FBISilk Road online drug marketplace sized by FBI

Silk Road online drug marketplace sized by FBI

FBI seizes underground drug market Silk Road and identified its owner. The site was producing earning for more than $1.2…

12 years ago
Beware Apple iMessage app for Android, it is a dangerous fakeBeware Apple iMessage app for Android, it is a dangerous fake

Beware Apple iMessage app for Android, it is a dangerous fake

A fake Apple iMessage app for Android OS has been published on official Google Play app store for around one…

12 years ago
Group-IB Threat Intelligence Report 2012–2013 H1, a must readGroup-IB Threat Intelligence Report 2012–2013 H1, a must read

Group-IB Threat Intelligence Report 2012–2013 H1, a must read

Group-IB Threat Intelligence Report 2012–2013 H1 is an excellent analysis on the state and dynamics of today’s market of computer…

12 years ago
AndroRAT drives the rise for DIY Android hacking toolsAndroRAT drives the rise for DIY Android hacking tools

AndroRAT drives the rise for DIY Android hacking tools

AndroRAT is just one of the numerous open-source tools that was created and published on the undergroud forums to allow…

12 years ago
Liberty Reserve suspension and impact on criminal undergroundLiberty Reserve suspension and impact on criminal underground

Liberty Reserve suspension and impact on criminal underground

Private currency exchange system Liberty Reserve was shut down by US law enforcement, it is considered most popular payment system…

12 years ago
New trends in the underground market, the offer of cybercrimeNew trends in the underground market, the offer of cybercrime

New trends in the underground market, the offer of cybercrime

The monitoring of the criminal underground is essential to understand the dynamics of cybercrime and related offer on the black market.…

12 years ago