• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Boris Razor & Alex Mess

MITRE ATT&CK Matrix: How the Threat Description Language Works and How It’s Used
Security

MITRE ATT&CK Matrix: How the Threat Description Language Works and…

3 weeks ago13/09/2025Boris Razor & Alex Mess2080
MITRE ATT&CK is one of the most widely used frameworks among cybersecurity professionals. In this article, we’ll cover how the knowledge base was created and how it’s structured—how it’s used to describe malware capabilities, profile APT groups,…
CONTINUE READING 🡒
Penguin’s secretes: Evidence collection in Linux
Security

Penguin’s secretes: Evidence collection in Linux

06.02.202508/04/2025Boris Razor & Alex Mess670
Hey, bro, are you aware that Windows is dead? Everyone is switching to free software nowadays. You’re a hacker security guy, right? So, your job is to ensure security. And here’s an interesting case to be investigated: a Linux computer and an incident that occurred with it.…
CONTINUE READING 🡒
Malware under surveillance. Sandboxes and how to detect them
Security

Malware under surveillance. Sandboxes and how to detect them

16.09.202108/04/2025Boris Razor & Alex Mess970
Boris Razor & Alex Mess One of the ways to detect malware is to run it in a sandbox, i.e. in an isolated environment where you can monitor the program’s behavior. In this article, we will explain how sandboxes work and examine techniques allowing malicious…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com