Join the Conversation

By The Nyotron Security Research Team Another NSA tool manual was leaked and published on WikiLeaks. It is not certain that this tool was indeed used by the NSA, but taking the recent leaks into consideration the existence of such tool is not farfetched. According to the manual, this specific tool uses the Wi-Fi of […]

By Nyotron Security Research Team What is EMET? EMET (Enhanced Mitigation Experience Toolkit) is a utility provided by Microsoft for free. This utility is designed to make the process of exploiting a vulnerability difficult for an attacker (and sometimes, even make it impossible). EMET helps prevent successful exploitation of vulnerabilities in software by using various […]

By The Nyotron Security Research Team TheFatRat is a rather new post exploitation tool which is designed to generate payloads using a friendly and easy-to-use interface. This tool is another weapon in the attacker’s arsenal, but it’s mostly using known payloads from the different robust Metasploit framework. The advantages of using TheFatRat over Metasploit framework, […]

By Nyotron Security Research Team The Mexican government is accused of spying on journalists and activists with the NSO Group’s “Pegasus” surveillance software. Journalists claim that even though the NSO Group say that they make sure that their product will not be used for human rights violations, the software should be limited to investigations of […]

By Nyotron Security Research Team SMB (Server Message Block) protocol is a 30-year-old protocol which is mainly used to provide shared access to files, printers and serial ports. The next update for Windows 10 which is named Redstone3 – v1709 will not include the SMBv1 protocol, which was used in the recent WannaCry Ransomware attack, […]

By Nyotron Security Research Team Nayana, a large web hosting company based in South Korea, was badly hit by a variant of Erebus Ransomware, a newly discovered Ransomware that targets Linux systems which damaged over 3,400 websites. This specific variant targets 433 different file types, including images, videos, databases, documents and others. The attacker requested […]

By Nyotron Security Research Team The National Security Agency (NSA) decided to publish a large set of tools developed within the secret corridors of the Agency to the public. Although skepticism ensued rapidly following the leak that resulted in the large WannaCry epidemic, our security research team decided to take a look of the repository. […]

By Nyotron Security Research Team If you are a Swedish citizen, your personal data was probably leaked to the public. The sensitive data leaked included images, names and home addresses from the Swedish Transport Agency, which also held private data on all vehicles in Sweden. Since this included some vehicles from the police and military, […]

By Nyotron Security Research Team Botnets (a network of zombie computers) can become a dangerous tool for attackers. The principal is simple: infect as many machines as you can, which eventually will be connected to your command and control server, and perform almost any malicious activity you can think of. Botnets are usually used for […]

By Nyotron Security Research Team A new fileless ransomware named “SOREBRECT” has been discovered in the wild. It is categorized as a fileless ransomware. However, as we’ll dig into understanding what these terms actually mean, we’ll see that it isn’t quite true. First, a quick overview of the SOREBRECT and its actions: SOREBRECT starts off […]

Subscribe to our blog

Follow us on Social Media