Поздний сентябрьский вечер 2023 year. Вы лениво листаете eBay. Среди обычного барахла попадается странное железо — тяжелые промышленные модули. На платах красуются логотипы Siemens и AREVA. Описание скудное, но профессиональное, цена удивительно доступная. Перед вами компоненты системы Teleperm XS — Read More …
Category: Информационная безопасность
Steam's alleged hacking is at risk 89 millions of accounts.
What happened? Reported, that data 89 Millions of Steam accounts were at risk due to the alleged leakage, associated with Twilio, service, which Steam uses to send SMS with 2FA codes. Flowing data, Including SMS logs, 2FA codes and metadata, Sold on dark Read More …
The distribution of malicious in Noodlophile under the guise of AI services video generation
Attackers began to use fake video generation tools using artificial intelligence, to spread a new type of malicious software - noodlophile, infostiler, disguised as the result of the work of "AI-services". Fraudulent sites use attractive names, such as Dream Machine, and are actively advertised through large Read More …
Analysis of web browsers telemetry 2025

After the publication of the translation of the original article, prepared by the user SIZEOF, Colleagues asked to additionally test several browsers. The purpose of testing was to determine, What outgoing compounds are created after the installation of browsers and at their first launch. Refusal of liability data are provided as it is - without conclusions Read More …
Digital detective cheat sheets.

Digital forensics – it's an identification process, conservation, extraction, data analysis and presentation, that have been processed electronically and stored on digital devices. This data, known as digital artifacts, can be found in computers and smartphones and may play a key role in Read More …
Where to store secret files?
All human information can be divided according to importance, like that: Losing files is always unpleasant. That's why we make backups. But the degree to which information security efforts are paranoid depends on the importance. There is a file category, which cannot be lost under any circumstances, even in case of BP. Read More …
Anonymous search networks. DuckDuckGo Review.

DuckDuckGo– it is a famous open source search engine, which declares, that it does not track or store personal information of its users. This is independent, which “tired” from online tracking. As the company itself declares: We help protect your privacy with our free browser, which can Read More …
Analysis of the HelloKitty ransomware source code
Assembly and handwriting. For the purpose of analysis, the source code was taken, leaked to the public on October 10, 2023. The program is written in C++ (uses the C++17 standard and supports Windows XP) and was assembled on MSVS 2015. Project file tags indicate the creation of source code on a Russian-language OS. Read More …
Cloudflare's DDoS protection was bypassed
Protection Mechanisms, configured by Cloudflare customers (For example, firewall, preventing DDoS attacks) for websites, may be bypassed due to gaps in firewall security controls, potentially exposing clients to attacks, which Cloudflare should prevent. Attackers can use their own Cloudflare accounts to abuse trusted relationships Read More …
PoSH-R2 script for collecting various diagnostic information

Description PoSh-R2PowerShell – this is a set of powershell scripts for Windows Management Instrumentation (WMI), which investigators and forensic analysts can use to extract information from compromised (or potentially compromised) Windows systems. The scripts use WMI to extract this information from the operating system. Hence, this Read More …