Zarp Network Attack tool

Corporate local area networks may have several vulnerabilities that allow attackers disrupt services or exploit the detected vulnerabilities. One of the tool that you can use to pentest local networks is Zarp Network Attack tool.  Zarp allows to perform network

PuTTY Client Found Compiled with Trojan

PuTTY Client Found Compiled with Trojan New version of putty SSH-client have been spotted compiled with a Trojan. This copy is running the same way as the usual one to allow user connect to different servers but it also include

PyPhisher – Python Tool for Phishing

phlishing

Tools for running a phishing campaign may exist in several format. phishing tests can be used during  a penetration testing or a security awareness program to provide users the type of attacks that hackers perform to compromise credentials. If you

Interview about Cloud Computing on Express FM DATA

This week I have been honored to be a guest on one of the popular Tech program in Tunisia. The program covers all new technologies exist in the country and one of the hottest topic at the moment is Cloud

How to Conduct a Security Audit for SMBs

Security Audit for SMBs

Data breaches aren’t news anymore. In less than five years, cyber crimes went from leading story to page six, because they happen too often for us to stop and pay attention to all of them. But businesses that are victims

Provide Optimum Security for Your Home with These Three Tech Upgrades

Keeping your belongings and loved ones safe is a goal that most people have in common. Sure, you hope and pray that your home is never burglarized, vandalized, or damaged by some natural disaster, but the truth is you can’t

Invoice Spam Campaign Drop Banking Trojan

Credit card online

TrendMicro is alerting of a new malware called TROJ_WERDLOD. This is a Trojan horse that is targeting users in Japan. The malware was firstly seen last December 2014 and infected more than 400 machines. This malware is very interesting that