Redefining Cyber Threats

SPARK WordPress Theme by D5 Creation

Who We Are?

Offensive and Defensive experts with different approaches alongside complimentary knowledge to aid in the protection of your Enterprise Network Security and Application Security Experts Forensic Investigation Experts Trainers in the areas of: Senior Hacking, Security Awareness, Penetration Testing, Risk Assessment, and other InfoSec areas.

Jacky Altal


Dr. NK

Buissness Development Mentor



Eden Levinson

Security Researcher / Penetration Tester


Dev Team



How I Hacked Facebook, and Found Someone’s Backdoor Script

As a pentester, I love server-side vulnerabilities more than client-side ones. Why? Because it’s way much cooler to take over the server directly and gain system SHELL privileges. <( ̄︶ ̄)> Of course, both vulnerabilities from the server-side and the client-side are indispensable in a perfect penetration test. Sometimes, in order to take over the server more elegantly, it also need some client-side vulnerabilities to do the trick. But speaking of finding vulnerabilities, I prefer to find server-side vulnerabilities first. With theRead More…

hackers can bypass Microsoft’s Windows AppLocker

Clever hackers can bypass Microsoft’s Windows AppLocker security feature by abusing a hidden trait of the Regsvr32 command-line utility that’s normally used to register DLLs on a Windows computer. http://news.softpedia.com/news/windows-applocker-bypass-allows-attackers-to-registers-dlls-off-the-internet-503289.shtml

Social Engineering: Pranksters targeted Burger King restaurants in Oklahoma

Pranksters targeted Burger King restaurants in Oklahoma and Minnesota this week and convinced employees to smash the windows because of possible safety concern. Employees at a Burger King in Shawnee, Okla., received a call from someone who claimed to be with the fire department Thursday night, according to KFOR. That person told employees they had to break all the windows because of a gas leak. “The employee stated that a person called them and told them there were high levels of carbonRead More…

Panama Papers – Overview/Download

The Secret List of Off-Shore-Companies, Persons and Adresses http://openermedia.blogspot.co.il/2015/03/ Download DB: Panama Papers: ICIJ Offshore Leaks Database Documents Download [Complete]

The Laughably Bad Security at ‘Panama Papers’ firm Mossack Fonseca

Unencrypted emails, and systems older than your dog. There are many lessons to be learned from this week’s leak of the so-called “Panama Papers,” but here’s some real news you can use: If you’re a law firm dealing with the highly sensitive financial information of the world’s most powerful people, you should probably update your software more than once every seven years. It’s still not clear precisely how a giant trove of documents detailing offshore tax shelters made its wayRead More…

“Because I saw somebody smarter than I am had a piece of tape over their camera.”

FBI director reveals why he puts tape over his laptop’s webcam During the Wednesday speech, Comey discussed a myriad of issues concerning privacy and encryption in the wake of the U.S. Department of Justice’s very public spat with Apple over hacking into a locked iPhone that belonged to one of the San Bernardino shooters. Although the government used legal action to try and compel Apple to aid in unlocking the iPhone, when Apple refused, the FBI later announced that it had found a wayRead More…

snapchat record screen – look mom no hands!

If you’d rather not have that little gray dot on your screen all the time, you can quickly turn it on and off from the Settings app. how-to-record-in-snapchat-without-hands-2016

eMMC backdoor leading to bootloader unlock on Samsung Galaxy Devices Discovered and documented by Sean Beaupre (beaups )

eMMC backdoor leading to bootloader unlock on Samsung Galaxy Devices Discovered and documented by Sean Beaupre (beaups) SAMDUNK_1

Wireshark crash vulnerability

Wireshark suffers from a crash vulnerability due to a static memory out-of-bounds write that can be observed in an ASAN build of Wireshark . wireshark

Proofpoint has collected evidence of new Carbanak group campaigns.The hackers are targeting banks in the Middle East, the United States and other countries.

Carbanak Group targets entities in Middle East and US with new TTPs