Performing Ethical Hacking Through a VPN Service for a Full Attack Simulation

A major difficulty in defending against attackers and performing accurate attribution, lies in the fact that threat actors often route their traffic through the proverbial seven proxies. Defenders often spend many hours determining the source of malicious traffic, only to find that the attacker has compromised the web server of an unrelated victim somewhere on … Continue reading “Performing Ethical Hacking Through a VPN Service for a Full Attack Simulation”

0

The Vault 7 leak by Wikileaks reveal CIA hacking tools, hoarded zero day exploits

Wikileaks has released a set of CIA documents in a new series of leaks that reveal the Central Intelligence Agency’s (CIA) hacking capability. The Vault 7 leak by Wikileaks starts with 8,761 documents which came from servers in Langley, Virginia. It’s been revealed that the CIA uses a host of tools under the Engineering Department … Continue reading “The Vault 7 leak by Wikileaks reveal CIA hacking tools, hoarded zero day exploits”

0