Hacker tools and techniques: Underground hacking sites
Hackers frequently update their attack tools, techniques and methods to find new ways to break into databases, networks and devices. Track their progress and the work of cybercrime investigators with the latest information on hacking groups, underground hacker sites and new hacker tools.
Top Stories
- 
				News
					28 Oct 2021
					
									
										  Avast releases decryptors for multiple ransomware strainsVictims of three separate ransomware families can now recover data using tools developed by the antivirus vendor with help from a malware analyst and an alleged Babuk developer. Continue Reading By- Arielle Waldman, Features Writer, Dark Reading
 
- 
				News
					15 Oct 2021
					
									
										  Accenture sheds more light on August data breachThe IT services giant disclosed in an SEC filing that threat actors stole and leaked proprietary data during a LockBit ransomware attack earlier this year. Continue Reading By- Shaun Nichols, TechTarget
 
- 
                Podcast
                28 Apr 2017
                  Risk & Repeat: More Equation Group cyberweapons leakedIn this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the latest round of Equation Group cyberweapons and how Microsoft patched them. Continue Reading By- Rob Wright, Senior News Director, Dark Reading
 
- 
                News
                18 Apr 2017
                  Shadow Brokers' Windows exploits target unsupported systemsA new release of NSA cyberweapons falls flat, as Windows exploits from the Shadow Brokers have mostly been patched. But unsupported systems are still at risk. Continue Reading By- Michael Heller, TechTarget
 
- 
                News
                14 Apr 2017
                  Shadow Brokers release SWIFT banking and Windows exploitsThe Shadow Brokers released another cache of cyberweapons linked to the Equation Group, including Windows exploits and attack details for the SWIFT banking system. Continue Reading By- Michael Heller, TechTarget
 
- 
                Feature
                03 Apr 2017
                  Politics of cyber attribution pose risk for private industryWhy nation-state attribution plays a major role in the U.S. government's willingness to share cyberthreat intelligence with private-sector companies. Continue Reading By- Adam Rice and Mark Maunu
 
- 30 Mar 2017
- 
                News
                17 Mar 2017
                  Yahoo fallout: Minted authentication cookies raise concernsAlthough minting authentication cookies is not widely understood, the Yahoo hacker indictments has brought it to the forefront and shown it can be very dangerous. Continue Reading By- Michael Heller, TechTarget
 
- 
                News
                14 Feb 2017
                  Microsoft: Nation-state cyberattacks have changed the security gameMicrosoft's Brad Smith spoke at RSA Conference 2017 about the effects of nation-state cyberattacks and what businesses and governments can do about them. Continue Reading By- Rob Wright, Senior News Director, Dark Reading
 
- 
                Podcast
                25 Jan 2017
                  Risk & Repeat: Windows SMB warning raises questions, concernsIn this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the Shadow Brokers' alleged exploit for Windows SMB and what it means for both enterprises and Microsoft. Continue Reading By- Rob Wright, Senior News Director, Dark Reading
 
- 
                News
                20 Jan 2017
                  Carbanak gang using Google services for command and controlResearchers find the Carbanak gang has evolved its attacks on financial institutions to use Google services for command and control infrastructure in malware. Continue Reading By- Michael Heller, TechTarget
 
- 
                News
                29 Aug 2016
                  Pegasus iOS exploit uses three zero days to attack high-value targetsA new remote iOS exploit called Pegasus leverages three zero days in what appear to be state-sponsored targeted attack campaigns against political dissidents. Continue Reading By- Michael Heller, TechTarget
 
- 
                News
                01 Dec 2015
                  Amex credit card hack predicts replacement card numberSamy Kamkar found a weakness in the algorithm American Express uses to generate replacement card information and created a credit card hack as a proof-of-concept. Continue Reading By- Michael Heller, TechTarget
 
- 
                Opinion
                01 Dec 2015
                  WMI tools make the perfect crime 'malware-free'Security researchers claim that attackers are abusing a longstanding administrative tool in the Windows operating system. With no telltale signs of malware, how can you stop it? Continue Reading 
- 
                Feature
                08 Oct 2015
                  Emerging security threats you're up against nowLearn about the 'hacking as a service' and other emerging security threats. Continue Reading By
- 
                Answer
                17 Aug 2015
                  Can a new encryption trick prevent reverse engineering?Expert Michael Cobb explains how reverse engineering can be made more difficult with an approach called Hardened Anti-Reverse Engineering System or HARES. Continue Reading By
- 
                Tip
                10 Apr 2014
                  NSA TAO: What Tailored Access Operations unit means for enterprisesThe NSA's top-secret Tailored Access Operations offensive hacking unit offers enterprise defense strategy lessons. Expert Nick Lewis discusses. Continue Reading By
- 
                Answer
                12 Feb 2013
                  What risk does the Apple UDID security leak pose to iOS users?Expert Michael Cobb details Apple's Unique Device Identifiers, plus why iOS users should be concerned about the Anonymous UDID security leak. Continue Reading By
- 
                Answer
                25 Aug 2011
                  Locate IP address location: How to confirm the origin of a cyberattackWhat's the best way to determine the origin of a cyberattack? Expert Nick Lewis weighs in. Continue Reading By
- 
                Definition
                24 Sep 2010
                  alternate data stream (ADS)An alternate data stream (ADS) is a feature of Windows New Technology File System (NTFS) that contains metadata for locating a specific file by author or title. Continue Reading 
- 
                News
                24 Mar 2010
                  Apple iPhone, Microsoft IE 8 get hacked in Pwn2Own contestHackers also exploited zero-day vulnerabilities in Apple Safari and Mozilla Firefox browsers in the first day of TippingPoint's Pwn2Own contest Wednesday. Continue Reading By- Robert Westervelt, TechTarget
 
- 
                Tip
                05 Mar 2008
                  Built-in Windows commands to determine if a system has been hackedIn this tip, contributor Ed Skoudis identifies five of the most useful Windows command-line tools for machine analysis and discusses how they can assist administrators in determining if a machine has been hacked. Continue Reading By- Ed Skoudis, SANS Technology Institute
 
- 
                Tip
                17 Jan 2008
                  Ten hacker tricks to exploit SQL Server systemsSQL Server hackers have a medley of tricks and tools to gain access to your database systems. Learn their techniques and test SQL Server security before they do. Continue Reading By- Kevin Beaver, Principle Logic, LLC
 
