TFTP simple and practical protocol
File transfer is one of the most essential technologies for computer and client / server network infrastructures. TFTP was developed…
Network port – What should we know about these?
A network port is a bit like a door to which the application of a device connects to another remote…
Nephilim Ransomware targets wealthy companies
Ransomware attacks are one of the most damaging threats to organizations, both in operational, economic and reputational terms, and in…
LockBit – A constantly evolving ransomware
Discovered by MalwareHunterTeam, LockBit is a ransomware. Malicious software under this classification is designed to encrypt data. Cyber criminals behind…
Identd is a protocol that helps to identify the user
An identification or Identd protocol, also called a user authentication protocol, is an interactive protocol that allows one party to…
JSSLoader – A Threat That Comes Back Improved
Code refactoring is a popular technique that software developers use to, in simple terms, modify the internal structure of their…
Meow threat not as friendly as its name
Some may already know it and others do not but today we come to talk about Meow which is well…
Diavol – A diabolical ransomware from Wizard Spider
Researchers from the cybersecurity company FortiGuard Labs (a Fortinet firm) have linked a new ransomware campaign called Diavol and it…
ArnoldC For Arnold Schwarzenegger Lovers
If programming bores you, maybe it is because you have not found the right programming language and ArnoldC may meet…
XSS Attacks – A fairly common threat
XSS occurs when an attacker is able to inject a script, usually Javascript, into the output of a web application…

