Homepage
Open in app
Sign inGet started

Purple Team

Help cybersecurity professionals to enhance their knowledge.

  • Write For Us
  • Archive
  • White Hat Institute
  • Anyone can now generate bogus Chrome browser windows thanks to a new phishing toolkit

    Anyone can now generate bogus Chrome browser windows thanks to a new phishing toolkit

    Red teamers and cybercriminals may now develop successful single sign-on phishing login forms using phony Chrome browser windows thanks to…
    Go to the profile of David Artykov
    David Artykov
    Mar 22, 2022
    Exploiting SQL injection vulnerabilities

    Exploiting SQL injection vulnerabilities

    SQL Injection is a sort of infusion assault that makes it conceivable to execute malicious SQL statements. These statements control a…
    Go to the profile of David Artykov
    David Artykov
    Jul 10, 2020
    Several Security Flaws Identified in Major Software Package Managers

    Several Security Flaws Identified in Major Software Package Managers

    Multiple security flaws have been discovered in major package managers that, if exploited, might allow attackers to run arbitrary code and…
    Go to the profile of David Artykov
    David Artykov
    Mar 11, 2022
    The Synergy of Cyber Threat Intelligence and Military Intelligence: How They Complement Each Other

    The Synergy of Cyber Threat Intelligence and Military Intelligence: How They Complement Each Other

    In today’s world, national security is not just a matter of physical threats but also virtual ones. As we rely more and more on technology…
    Go to the profile of Ravishanka Silva
    Ravishanka Silva
    Mar 13
    Python Telnet Honeypot

    Python Telnet Honeypot

    Python Telnet Honeypot
    Go to the profile of Anil Yelken
    Anil Yelken
    Feb 14
    Cybersecurity and Cryptocurrencies — How do they interact?

    Cybersecurity and Cryptocurrencies — How do they interact?

    Cybersecurity professionals wrinkle their noses at the mere mention of cryptocurrency, immediately associating it with crypto crimes. This…
    Go to the profile of Patricia de Hemricourt
    Patricia de Hemricourt
    Jan 9
    Python APT1 Simulator

    Python APT1 Simulator

    Python APT1 Simulator
    Go to the profile of Anil Yelken
    Anil Yelken
    Nov 13, 2022
    PHP Source Code Analysis

    PHP Source Code Analysis

    PHP Source Code Analysis
    Go to the profile of Anil Yelken
    Anil Yelken
    Nov 1, 2022
    SOAR Development with Python

    SOAR Development with Python

    SOAR Development with Python
    Go to the profile of Anil Yelken
    Anil Yelken
    Oct 27, 2022
    Pywirt — Python Windows Incident Response Toolkit

    Pywirt — Python Windows Incident Response Toolkit

    Pywirt — Python Windows Incident Response Toolkit
    Go to the profile of Anil Yelken
    Anil Yelken
    Oct 23, 2022
    Murenshark Detection Sigma Rules

    Murenshark Detection Sigma Rules

    Murenshark Detection Sigma Rules
    Go to the profile of Anil Yelken
    Anil Yelken
    Aug 22, 2022
    What is OSINT

    What is OSINT

    We have been trying to find someone online, specifically perhaps by using an email address, or username. Here the use of OSINT comes.
    Go to the profile of Abhinav Pathak
    Abhinav Pathak
    Aug 6, 2022
    How to Protect your Online Privacy

    How to Protect your Online Privacy

    In today's world where Privacy is only a Myth, we can do whatever things to protect our privacy but the data stolen by Hackers, Data…
    Go to the profile of Abhinav Pathak
    Abhinav Pathak
    Jul 22, 2022
    Bahamut Android Malware Sigma Rule

    Bahamut Android Malware Sigma Rule

    Bahamut Android Malware Sigma Rule
    Go to the profile of Anil Yelken
    Anil Yelken
    Jun 30, 2022
    GlowSand Sigma Rule

    GlowSand Sigma Rule

    GlowSand Sigma Rule
    Go to the profile of Anil Yelken
    Anil Yelken
    Jun 30, 2022
    BlackGuard Stealer Targets the Gaming Community Sigma Rule

    BlackGuard Stealer Targets the Gaming Community Sigma Rule

    BlackGuard Stealer Targets the Gaming Community Sigma Rule
    Go to the profile of Anil Yelken
    Anil Yelken
    Jun 28, 2022
    BRONZE STARLIGHT Ransomware Operations Use HUI Loader Sigma Rules

    BRONZE STARLIGHT Ransomware Operations Use HUI Loader Sigma Rules

    BRONZE STARLIGHT Ransomware Operations Use HUI Loader Sigma Rules
    Go to the profile of Anil Yelken
    Anil Yelken
    Jun 27, 2022
    Unidentified RAT Sigma Rule

    Unidentified RAT Sigma Rule

    Unidentified RAT Sigma Rule | Threat Hunting | SO
    Go to the profile of Anil Yelken
    Anil Yelken
    Jun 26, 2022

    Cerber2021 Ransomware Back in Action(CerberImposter)

    Cerber2021 Ransomware Back in Action(CerberImposter)
    Go to the profile of Anil Yelken
    Anil Yelken
    Jun 21, 2022
    The Four V’s of Effective Cybersecurity Posture

    The Four V’s of Effective Cybersecurity Posture

    There are four critical angles to achieve optimal cyber defense: Visibility, verification, vigilance, and validation. Rapid development…
    Go to the profile of Patricia de Hemricourt
    Patricia de Hemricourt
    Jun 12, 2022

    Twisted Panda Sigma Rules

    Twisted Panda Sigma Rules
    Go to the profile of Anil Yelken
    Anil Yelken
    May 22, 2022

    Mustang Panda New Wave Malware

    https://raw.githubusercontent.com/anil-yelken/sigma-rules/main/MustangPandaNewWaveMalware.yml
    Go to the profile of Anil Yelken
    Anil Yelken
    May 19, 2022
    Since January, the Android trojan has been present on the Google Play Store

    Since January, the Android trojan has been present on the Google Play Store

    Cybersecurity experts monitoring the mobile app ecosystem have seen an increase in trojan infections on the Google Play Store, with one of…
    Go to the profile of David Artykov
    David Artykov
    Mar 16, 2022
    Ford will ship and sell cars that are lacking chips

    Ford will ship and sell cars that are lacking chips

    According to Automotive News, Ford will likely start manufacturing and shipping unfinished, but driveable vehicles that lack the chips that…
    Go to the profile of David Artykov
    David Artykov
    Mar 13, 2022
    Microsoft has patched a severe Azure problem that exposed client information

    Microsoft has patched a severe Azure problem that exposed client information

    Microsoft has patched a flaw in the Azure Automation service that may have enabled intruders to take full control of data belonging to…
    Go to the profile of David Artykov
    David Artykov
    Mar 8, 2022
    Microsoft has halted all new sales in Russia

    Microsoft has halted all new sales in Russia

    In response to Russia’s “unjustified, unprovoked, and illegitimate invasion” of Ukraine, Microsoft declared that it will halt all…
    Go to the profile of David Artykov
    David Artykov
    Mar 6, 2022
    Thousands of GitLab instances are affected by a new security flaw.

    Thousands of GitLab instances are affected by a new security flaw.

    Security researchers have revealed details of a now-patched security flaw in GitLab, an open-source DevOps platform, that may enable a…
    Go to the profile of David Artykov
    David Artykov
    Mar 4, 2022
    Thousands of people have downloaded this data-stealing Android app

    Thousands of people have downloaded this data-stealing Android app

    In an effort to seize identities and two-factor authentication tokens, cybercriminals have effectively hidden a banking Trojan on the…
    Go to the profile of David Artykov
    David Artykov
    Mar 4, 2022
    About Purple TeamLatest StoriesArchiveAbout MediumTermsPrivacy