‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Yuki-Chan Automated Pen Testing Tool, Publicly Released

We are recommending for quite a while for companies serious with their IT security to subject itself to a thorough penetration testing. Pen test can be done internally by knowledgeable IT staff, or the company can hire an external pen testing team. Members of pen test teams are passionable when it comes to detecting weaknesses

[ Read More ]

Monero Mining Malware Trojan.Win32.Fsysna Causing Havoc In The Wild

Since cryptojacking malware came into the scene, its favorite cryptocurrency to mine at the expense of its victims is Monero. This is due to the simplicity of mining XMR compared to Bitcoin (BTC), where stolen GPU and CPU cycles can be used for resolving hashes. Recently, Check Point has once again discovered the growing number

[ Read More ]

Facebook Blocks 1.2 Million Videos About The NZ’s Mosque Terror Attack

The recent attacks against mosques in Christchurch, New Zealand captures the attention of the world. Copies of the video footage of the actual event were spreading like wildfire in social media. The terrorists themselves launched a live video of the shooting incident that killed at least 50 people from two mosques. According to the New

[ Read More ]

Beijing Internal Network Also A Victim Of Ransomware

Beijing is the favorite whipping boy of the Western powers when it comes to being accused of abusing its citizens, causing harm for the rest of the world through its espionage campaigns and maintaining its own army of blackhat elite hackers. However, the reality is China is as vulnerable a country to typical cyber attacks

[ Read More ]

SandCat And FruityArmor Campaigns Took Advantage Of Zero-Day Flow

Critical vulnerability under CVE-2019-0797 has been recently patched by Microsoft in order to lessen the chances of two Advanced Persistent Threat groups, SandCat, and FruityArmor from taking advantage of it. The former zero-day exploit was being exploited by the two groups extensively, with many of their victims unaware of it. This is given since only

[ Read More ]

Microsoft To Roll Back Updates Which Cause Failed Boot

When Windows 10 was first introduced in 2015, the roll-out was not smooth sailing, but instead became a center of controversy for an operating system released by Redmond. It was accused of being an information collection tool for Microsoft, forced obsolescence of older version of Windows since DirectX 12 API is a Windows 10 exclusive

[ Read More ]

Australia VS Huawei Devices Storyline Never Die

The political propaganda against Huawei devices continues in the land down under, as the Australian Foreign Minister Marise Payne has ruled that the ban against Huawei’s 5G devices will continue to be implemented by the federal government. “We have taken the strongest advice from intelligence agencies in this country, the strongest technical advice as to

[ Read More ]

Streaming Music Service Competition To Intensify In India

Streaming services market is already saturated in western countries like the United States and the United Kingdom, the rest of North America and Europe. The only way for services such as Spotify and Youtube Music to expand is by entering new markets, especially in areas of emerging nations. That could be China, if not due

[ Read More ]

Google Service Downtime? Check Google Service Status Portal

Google services has become very influential for two decades now, to a point that the world is heavily depending on it for everyday stuff. Services like email, videos, messaging, authentication across many web services and etc are highly dependent on Google working as it should. We can safely say that a downtime of a Google

[ Read More ]

Mimikatz: A Deeper Look At Blackhat And Whitehat Hackers’ Shared Tool

There is a thin line that separates black hat hackers (malicious hackers) and white hat hackers (ethical hackers), both possess skills that can harm networks, systems, and computers if they wish to do so. The good thing is ethical hackers helps lessen the chances that blackhat hackers become successful with their campaigns. They do this

[ Read More ]