19/05/2020
Estimated read time : 2 min
https://hackernewsdog.com/top-data-recovery-softwares-tools/
Data recovery is important element for digital forensics experts and here we have presented a curated list of digital forensics tools
Hacker News Dog media is your reliable source of Tech news updates . HND is independent. HND is glob
(3)
Estimated read time : 2 min
https://hackernewsdog.com/top-data-recovery-softwares-tools/
Data recovery is important element for digital forensics experts and here we have presented a curated list of digital forensics tools
https://hackernewsdog.com/how-to-install-snort-ids-architecture/
All you need to know about SNORT IDS architecture and how to use it
Noob diaries !
https://hackernewsdog.com/best-memory-dump-tools-for-forensics/
Taking RAM dump and memory dump is crucial part of any digital forensics investigation . We presented curated list of tools that can be used for dumping memory
Kids these days !
privacy issues as TikTok used as spying handle by china . Tiktok board of directors have members directly from the ruling communist party of china.
Massive data breach
https://hackernewsdog.com/french-newspaper-le-figaro-hacked-data-exposed/
Massive data breach of popular french newspaper Le figaro exposed Terabytes of data
This post is sponsored by AVAST ANTIVIRUS
No i am serious !
Oh wtf !
https://hackernewsdog.com/digital-ocean-data-leak-breach-exposed/
digital ocean customers data leaked and exposed online
Zoom and unacademy just got their surprise backup
https://hackernewsdog.com/google-chrome-recover-history-forensics/
Lot of interested data can be recovered from google chrome with the help of digital forensics like urls visited , cookies and cache
Super duper week for hackers! India's biggest online learning platform hacked
https://hackernewsdog.com/unacademy-hacked-data-sale-online/
Online learning platform unacademy got hacked and data has been put on sale over the dark web
Hahaha.. don't forget to cover your cam and mic guys
https://hackernewsdog.com/zoom-data-breach-hacked-accounts-sale-dark-web/
Zoom data breach accounts up for sale on darkweb sites
https://hackernewsdog.com/top-browser-forensics-tools-firefox/
how to check deleted browser history url addresses through browser forensics tools
Big breaking coming in ! Godaddy confirmed breach.
https://hackernewsdog.com/godaddy-hacked-breached-stolen-data/
Go daddy hacked in October 2019 and now confirmed by company
https://hackernewsdog.com/darkweb-markets-search-engines/
In this blog we are covering popular darkweb markets available and some search engines to make things easy
Forensics people out here send your recommendations
https://hackernewsdog.com/best-memory-dump-tools-for-forensics/
Taking RAM dump and memory dump is crucial part of any digital forensics investigation . We presented curated list of tools that can be used for dumping memory
For data recovery forensics enthusiasts
https://hackernewsdog.com/top-data-recovery-softwares-tools/
Data recovery is important element for digital forensics experts and here we have presented a curated list of digital forensics tools
https://hackernewsdog.com/what-is-threat-hunting-ioc-compromise/
curated detail about threat hunting and its steps covering all IOC indicator of compromise concepts
NOW THIS . ZOOM ACHIEVED ITS DESTINY: 10 paisa per account
https://hackernewsdog.com/zoom-data-breach-hacked-accounts-sale-dark-web/
Zoom data breach accounts up for sale on darkweb sites
Oh s**t ! wtf zoom
https://hackernewsdog.com/zoom-data-breach-hacked-accounts-sale-dark-web/.
Zoom data breach accounts up for sale on darkweb sites
Not like old school phishing . For educational purpose only by the way ;) https://hackernewsdog.com/how-to-phishing-attack-advance-tool-hiddeneye/
We will use open source tool hiddeneye here to perform advance attack
A good read for sure
https://hackernewsdog.com/how-malware-detects-virtual-machine/
malwares detects vm to hide their real nature and make analysis bit tricky
A quick read
https://hackernewsdog.com/darkweb-markets-search-engines/
In this blog we are covering popular darkweb markets available and some search engines to make things easy
A great tutorial
https://hackernewsdog.com/how-to-use-fatrat-spy-computer-mobile/
This article covers how to use fatrat tool framework that enables anybody to spy on all kind of devices
https://hackernewsdog.com/how-to-phishing-attack-advance-tool-hiddeneye/
We will use open source tool hiddeneye here to perform advance attack
The portable executable is a file format for the files which are used for executing in the windows.
https://hackernewsdog.com/how-to-static-malware-analysis-peview/
PEVIEW is popular tool to analyze portable executable header of malwares
For those who are aspiring to become malware analyst
https://hackernewsdog.com/how-to-use-resource-hacker-static-malware-analysis/
Resource hacker is one of great tools that can be use to extract crucial information from malwares
a good read for incident response enthusiasts https://hackernewsdog.com/what-is-threat-hunting-ioc-compromise/
curated detail about threat hunting and its steps covering all IOC indicator of compromise concepts
Get all updates directly on your smartphone through our telegram channel
subscribe now https://t.me/hackernewsdog
You can view and join right away.
After our last post on kilos search engine , we used another dark web search engine and typed some details for you https://hackernewsdog.com/how-to-use-candle-dark-web-search-engine/
Candle is a very popular search engine used to search through dark web
https://hackernewsdog.com/weleakinfo-seized-fbi-buy-breached-data/
weleakinfo was selling the sensitive information of breached data that was hacked from the past 3 years.The official statement from FBI, weleakinfo sold more than 12 billion user records
FBI on job again this time a very popular resource for cyber community seized
https://hackernewsdog.com/weleakinfo-seized-fbi-buy-breached-data/
weleakinfo was selling the sensitive information of breached data that was hacked from the past 3 years.The official statement from FBI, weleakinfo sold more than 12 billion user records
check your android phones for this vulnerability https://hackernewsdog.com/android-bug-that-plants-malware-using-nfc/
A Recently discovered bug in android revealed that it could be easily exploited to bypass android’s security mechanisms and easily install any vulnerable application in Android phones using NFC i.e Near Field Communication.
check them out https://hackernewsdog.com/nmap-scripting-engine-zenmap-port-scan-network/
NSE scripts listed below not only used in information gathering but also in vulnerability exploitation to be used only for educational purposes
https://hackernewsdog.com/are-you-safe-from-wanna-mine/
Are You Infected with WannaMine ?- In this modern world of technology, there must be no one who is not familiar with the word “BitCoin” . It is a virtual or a digital currency created in 2009 by an unknown person using alias as Satoshi Nakamoto
https://hackernewsdog.com/how-to-hack-netflix/
Netflix is the best entertainment source in today’s world. Its rapid growth in such a short span of time is amazing. Its leading fan base and premium features has made Netflix hacking is a very trending topic since it has launched. People want premium features for free to enjoy the amazing web ser...
https://hackernewsdog.com/top-10-sandbox-best-malware-analysis/
Here is the curated list of best automated and manual sandboxes
Be the first to know and let us send you an email when Hacker News Dog posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.
Want your business to be the top-listed Media Company?