Let's use our knowledge and apply it to a common problem: Weaponized Fake Reviews
true cybercrime
View All C2 True Cybercrime Pentesting Cybersecurity Cybersecurity Insights Evasion Enumeration Cybersecurity Research Operational Security RedTeam Privilege Escalation Persistence Physical Access Offensive Security Social Engineering
6 min read
True Cybercrime 18 min read
True Cybercrime Unpacking the technical evolution and methods behind Microsoft activation cracking, with a focus on KMS server abuses and their setup.
6 min read
True Cybercrime Leasing a SIM on a garage sale: confidentiality, integrity, availability
4 min read
True Cybercrime Today, pretty much all tools and methods are fair game when it comes to both Offensive and Defensive Security, especially when we're talking about Social Engineering.
4 min read
True Cybercrime When you start into Ethical Hacking, you may come from a lot of career pathes. For us this meant, we never before had contact or experience with the digital, criminal underworld. We had a lot to learn.
7 min read
True Cybercrime After we found an extensive guide, how to defraud Online Banking customers, we started analysing the topic.