Lateral movement guide: Remote code execution in Windows

Penetration into the target network is just the first stage of a hacking attack. At the next stage, you have to establish a foothold there, steal users’ credentials, and gain the ability to run arbitrary code in the system. This article discusses techniques used to achieve the above goals and explains how to perform lateral movement in compromised networks.
Read full article →

Coronavirus in darknet. New arrivals on black markets amid the pandemic

Amid the COVID-19 pandemic, plenty of products supposed to protect you against COVID-19, or ease the course of the disease, or even heal you became available on the darknet (as well as on legitimate marketplaces). Because the shady segment of the global network is of utmost interest to hackers, I decided to examine the assortment of goods offered there and compare the prices on the darknet and in ‘regular’ stores.
Read full article →