@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from Information Security Books (CONST@NTINE)
241 Pages
Google Removes 21 Malicious Android Apps from Play Store

Google has stepped in to remove several Android applications from the official Play Store following the disclosure that the apps in question were found to serve intrusive ads.

https://thehackernews.com/2020/10/google-android-malwar.html
Imprensa Oficial tem perfil do Twitter invadido

A autoria da invasão foi auto-proclamada por Renkill e Wumpus, que, além de alterar a bio do perfil para fazer divulgação deles mesmos, também aproveitou a deixa para criar um post brincando com a prisão imaginária de outro cibercriminoso relevante, conhecido na rede social como m1kesecurity. Para isso, usaram uma foto de outra operação da Polícia Civil de São Paulo.

https://thehack.com.br/imprensa-oficial-tem-perfil-do-twitter-invadido/
Tudo o que você queria saber sobre guerras cibernéticas

Mais recentemente, foi detectada uma tentativa de espionagem contra a Organização Mundial da Saúde (OMS) por parte do grupo de hackers de elite DarkHotel. Eles miraram em pesquisas sobre o novo coronavírus (SARS-CoV2) lançando uma cópia fiel do sistema de emails usado pelos colaboradores da entidade.

https://thehack.com.br/tudo-o-que-voce-queria-saber-sobre-guerras-ciberneticas/
Forwarded from @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Mobile Application Hackers Handbook

Mobile computing has changed the game. Your personal data is no longer just stored on your desktop in the sanctuary of your office or home. You now carry personally identifiable information, financial data, personal and corporate email, and much more in your pocket, wherever you go. The smartphone is quickly becoming ubiquitous, and with at least 40 applications installed on the average smartphone the attack surface is significant.

The focus of this book is highly practical. Although we provide some background theory for you to understand the fundamentals of mobile application vulnerabilities, our primary concern is documenting the techniques you need to master to attack and exploit them. Where applicable, we include real-world examples derived from our many years of experience and from publically documented vulnerabilities.

🕴 @Phantasm_Lab
Forwarded from @Phantasm_Lab
hacker:HUNTER - Wannacry: The Marcus Hutchins Story - All 3 Chapters

One day in May 2017, computers all around the world suddenly shut down.
A malware called WannaCry asks for a ransom. The epidemic suddenly stops,
because a young, British researcher finds a killswitch, by accident.

https://youtu.be/vveLaA-z3-o

🧬 @Phantasm_Lab
How Israel Rules The World Of Cyber Security | VICE on HBO

U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election,
a Ben Ferguson travels to Tel Aviv to find out how Israel is on its way to becoming the world's top cyber superpower.

https://youtu.be/ca-C3voZwpM
214 Pages
Forwarded from Information Security Books (CONST@NTINE)
111 Pages