Homepage
Open in app
Sign in
Get started
Purple Team
Help cybersecurity professionals to enhance their knowledge.
Write For Us
Archive
White Hat Institute
Follow
Anyone can now generate bogus Chrome browser windows thanks to a new phishing toolkit
Anyone can now generate bogus Chrome browser windows thanks to a new phishing toolkit
Red teamers and cybercriminals may now develop successful single sign-on phishing login forms using phony Chrome browser windows thanks to…
David Artykov
Mar 22, 2022
Exploiting SQL injection vulnerabilities
Exploiting SQL injection vulnerabilities
SQL Injection is a sort of infusion assault that makes it conceivable to execute malicious SQL statements. These statements control a…
David Artykov
Jul 10, 2020
Several Security Flaws Identified in Major Software Package Managers
Several Security Flaws Identified in Major Software Package Managers
Multiple security flaws have been discovered in major package managers that, if exploited, might allow attackers to run arbitrary code and…
David Artykov
Mar 11, 2022
The Synergy of Cyber Threat Intelligence and Military Intelligence: How They Complement Each Other
The Synergy of Cyber Threat Intelligence and Military Intelligence: How They Complement Each Other
In today’s world, national security is not just a matter of physical threats but also virtual ones. As we rely more and more on technology…
Ravishanka Silva
Mar 13
Python Telnet Honeypot
Python Telnet Honeypot
Python Telnet Honeypot
Anil Yelken
Feb 14
Cybersecurity and Cryptocurrencies — How do they interact?
Cybersecurity and Cryptocurrencies — How do they interact?
Cybersecurity professionals wrinkle their noses at the mere mention of cryptocurrency, immediately associating it with crypto crimes. This…
Patricia de Hemricourt
Jan 9
Python APT1 Simulator
Python APT1 Simulator
Python APT1 Simulator
Anil Yelken
Nov 13, 2022
PHP Source Code Analysis
PHP Source Code Analysis
PHP Source Code Analysis
Anil Yelken
Nov 1, 2022
SOAR Development with Python
SOAR Development with Python
SOAR Development with Python
Anil Yelken
Oct 27, 2022
Pywirt — Python Windows Incident Response Toolkit
Pywirt — Python Windows Incident Response Toolkit
Pywirt — Python Windows Incident Response Toolkit
Anil Yelken
Oct 23, 2022
Murenshark Detection Sigma Rules
Murenshark Detection Sigma Rules
Murenshark Detection Sigma Rules
Anil Yelken
Aug 22, 2022
What is OSINT
What is OSINT
We have been trying to find someone online, specifically perhaps by using an email address, or username. Here the use of OSINT comes.
Abhinav Pathak
Aug 6, 2022
How to Protect your Online Privacy
How to Protect your Online Privacy
In today's world where Privacy is only a Myth, we can do whatever things to protect our privacy but the data stolen by Hackers, Data…
Abhinav Pathak
Jul 22, 2022
Bahamut Android Malware Sigma Rule
Bahamut Android Malware Sigma Rule
Bahamut Android Malware Sigma Rule
Anil Yelken
Jun 30, 2022
GlowSand Sigma Rule
GlowSand Sigma Rule
GlowSand Sigma Rule
Anil Yelken
Jun 30, 2022
BlackGuard Stealer Targets the Gaming Community Sigma Rule
BlackGuard Stealer Targets the Gaming Community Sigma Rule
BlackGuard Stealer Targets the Gaming Community Sigma Rule
Anil Yelken
Jun 28, 2022
BRONZE STARLIGHT Ransomware Operations Use HUI Loader Sigma Rules
BRONZE STARLIGHT Ransomware Operations Use HUI Loader Sigma Rules
BRONZE STARLIGHT Ransomware Operations Use HUI Loader Sigma Rules
Anil Yelken
Jun 27, 2022
Unidentified RAT Sigma Rule
Unidentified RAT Sigma Rule
Unidentified RAT Sigma Rule | Threat Hunting | SO
Anil Yelken
Jun 26, 2022
Cerber2021 Ransomware Back in Action(CerberImposter)
Cerber2021 Ransomware Back in Action(CerberImposter)
Anil Yelken
Jun 21, 2022
The Four V’s of Effective Cybersecurity Posture
The Four V’s of Effective Cybersecurity Posture
There are four critical angles to achieve optimal cyber defense: Visibility, verification, vigilance, and validation. Rapid development…
Patricia de Hemricourt
Jun 12, 2022
Twisted Panda Sigma Rules
Twisted Panda Sigma Rules
Anil Yelken
May 22, 2022
Mustang Panda New Wave Malware
https://raw.githubusercontent.com/anil-yelken/sigma-rules/main/MustangPandaNewWaveMalware.yml
Anil Yelken
May 19, 2022
Since January, the Android trojan has been present on the Google Play Store
Since January, the Android trojan has been present on the Google Play Store
Cybersecurity experts monitoring the mobile app ecosystem have seen an increase in trojan infections on the Google Play Store, with one of…
David Artykov
Mar 16, 2022
Ford will ship and sell cars that are lacking chips
Ford will ship and sell cars that are lacking chips
According to Automotive News, Ford will likely start manufacturing and shipping unfinished, but driveable vehicles that lack the chips that…
David Artykov
Mar 13, 2022
Microsoft has patched a severe Azure problem that exposed client information
Microsoft has patched a severe Azure problem that exposed client information
Microsoft has patched a flaw in the Azure Automation service that may have enabled intruders to take full control of data belonging to…
David Artykov
Mar 8, 2022
Microsoft has halted all new sales in Russia
Microsoft has halted all new sales in Russia
In response to Russia’s “unjustified, unprovoked, and illegitimate invasion” of Ukraine, Microsoft declared that it will halt all…
David Artykov
Mar 6, 2022
Thousands of GitLab instances are affected by a new security flaw.
Thousands of GitLab instances are affected by a new security flaw.
Security researchers have revealed details of a now-patched security flaw in GitLab, an open-source DevOps platform, that may enable a…
David Artykov
Mar 4, 2022
Thousands of people have downloaded this data-stealing Android app
Thousands of people have downloaded this data-stealing Android app
In an effort to seize identities and two-factor authentication tokens, cybercriminals have effectively hidden a banking Trojan on the…
David Artykov
Mar 4, 2022
About Purple Team
Latest Stories
Archive
About Medium
Terms
Privacy