New articles

?‍? Purple Team.

?‍? Purple Team. • Purple Team — Helps the Red Team and Blue Team to be friends with each other, allowing the blue team to develop a strategy and technical measures to protect the infrastructure based on the vulnerabilities and shortcomings discovered by the red team. The task of such a team is to ensure and maximize the efficiency of all teams. ?‍? Purple Team.

? OSINT. Search for a target by username.

? OSINT. Search for a target by username. • You've probably already encountered a service for finding a target using the username "whatsmyname", and if you haven't, be sure to pay attention. Recently, this resource has been updated and now we can search for information on the username on 576 popular sites. There is also an opportunity to search through the list of usernames, rather than ? OSINT. Search for a target by username.

??‍? Steganography. Useful tools and resources.

??‍? Steganography. Useful tools and resources. • Steganography — for the first time this term was mentioned in 1499, and even then this word meant the transmission of information by keeping the fact of transmission secret. Oddly enough, nowadays steganography has not received widespread recognition among hackers, although it cannot be said that it has not been resorted to at all. ??‍? Steganography. Useful tools and resources.

? true story... How I was hacked, my cryptocurrency wallets were emptied, and what Apple said.

? true story... How I was hacked, my cryptocurrency wallets were emptied, and what Apple said. • The story of how the creator of the website for job search in the field of cryptocurrencies cryptojobslist withdrew personal savings in cryptocurrency, simultaneously gaining access to Apple, Yahoo, Gmail and Telegram accounts with two-factor authentication enabled. ? true story... How I was hacked, my cryptocurrency wallets were emptied, and what Apple said.