Unfortunately, you’ve probably already heard the cliche that “cybercrime abhors a vacuum”……
Read More →‘This code is used to create a reverse shell from a Microsoft Excel spreadsheet ‘Open a command promptmsfvenom -p windows/meterpreter/reverse_tcp…
Read More →Lastest episode – listen now! (Or read the transcript.)…
Read More →Undercover Austrian “controlled data buy” leads to Amsterdam arrest and ongoing investigation. Suspect is said to steal and sell all…
Read More →Rocheston Certified Cybercrime Investigator (RCCI) Exam Prep Guide. The RCCI exam RCT-92 is a challenging test that requires an in-depth…
Read More →We were going to write, “Once more unto the breach, dear friends, once more”… but it seems to go without…
Read More →Java code Bash while true do for i in {1..100} do echo “Processing thread $i” /bin/bash & done done…
Read More →It’s a really cool and super-simple trick. The question is, “Will it help?”…
Read More →