Homepage
Open in app
Sign in
Get started
Purple Team
Help cybersecurity professionals to enhance their knowledge.
Write For Us
Archive
White Hat Institute
Follow
Anyone can now generate bogus Chrome browser windows thanks to a new phishing toolkit
Anyone can now generate bogus Chrome browser windows thanks to a new phishing toolkit
Red teamers and cybercriminals may now develop successful single sign-on phishing login forms using phony Chrome browser windows thanks to…
David Artykov
Mar 22, 2022
Exploiting SQL injection vulnerabilities
Exploiting SQL injection vulnerabilities
SQL Injection is a sort of infusion assault that makes it conceivable to execute malicious SQL statements. These statements control a…
David Artykov
Jul 10, 2020
Several Security Flaws Identified in Major Software Package Managers
Several Security Flaws Identified in Major Software Package Managers
Multiple security flaws have been discovered in major package managers that, if exploited, might allow attackers to run arbitrary code and…
David Artykov
Mar 11, 2022
Fortifying the Future: A Deep Dive into 2024’s Advanced Cyber Threats and Their Assault on…
Fortifying the Future: A Deep Dive into 2024’s Advanced Cyber Threats and Their Assault on…
In the year 2024, prominent Global Enterprises engaged in technology and creativity will face sophisticated cyber risks (Advanced…
Noel
May 10
2024 Cloud Armor: Strengthening your business against data breaches and erosion of customer trust
2024 Cloud Armor: Strengthening your business against data breaches and erosion of customer trust
Prevent data corruption because of wrong cloud policy with this control. You don’t want to allow your customer personal data to get public…
Noel
Apr 22
AI and Data: Balancing Progress, Privacy, and Security
AI and Data: Balancing Progress, Privacy, and Security
With ChatGPT dominating the tech and other news, the concern about data security might have momentarily taken a back seat. Yet, the…
Patricia de Hemricourt
Apr 30, 2023
The Synergy of Cyber Threat Intelligence and Military Intelligence: How They Complement Each Other
The Synergy of Cyber Threat Intelligence and Military Intelligence: How They Complement Each Other
In today’s world, national security is not just a matter of physical threats but also virtual ones. As we rely more and more on technology…
Ravishanka Silva
Mar 13, 2023
Cybersecurity and Cryptocurrencies — How do they interact?
Cybersecurity and Cryptocurrencies — How do they interact?
Cybersecurity professionals wrinkle their noses at the mere mention of cryptocurrency, immediately associating it with crypto crimes. This…
Patricia de Hemricourt
Jan 9, 2023
What is OSINT
What is OSINT
We have been trying to find someone online, specifically perhaps by using an email address, or username. Here the use of OSINT comes.
Abhinav Pathak
Aug 6, 2022
How to Protect your Online Privacy
How to Protect your Online Privacy
In today's world where Privacy is only a Myth, we can do whatever things to protect our privacy but the data stolen by Hackers, Data…
Abhinav Pathak
Jul 22, 2022
The Four V’s of Effective Cybersecurity Posture
The Four V’s of Effective Cybersecurity Posture
There are four critical angles to achieve optimal cyber defense: Visibility, verification, vigilance, and validation. Rapid development…
Patricia de Hemricourt
Jun 12, 2022
Since January, the Android trojan has been present on the Google Play Store
Since January, the Android trojan has been present on the Google Play Store
Cybersecurity experts monitoring the mobile app ecosystem have seen an increase in trojan infections on the Google Play Store, with one of…
David Artykov
Mar 16, 2022
Ford will ship and sell cars that are lacking chips
Ford will ship and sell cars that are lacking chips
According to Automotive News, Ford will likely start manufacturing and shipping unfinished, but driveable vehicles that lack the chips that…
David Artykov
Mar 13, 2022
Microsoft has patched a severe Azure problem that exposed client information
Microsoft has patched a severe Azure problem that exposed client information
Microsoft has patched a flaw in the Azure Automation service that may have enabled intruders to take full control of data belonging to…
David Artykov
Mar 8, 2022
Microsoft has halted all new sales in Russia
Microsoft has halted all new sales in Russia
In response to Russia’s “unjustified, unprovoked, and illegitimate invasion” of Ukraine, Microsoft declared that it will halt all…
David Artykov
Mar 6, 2022
Thousands of GitLab instances are affected by a new security flaw.
Thousands of GitLab instances are affected by a new security flaw.
Security researchers have revealed details of a now-patched security flaw in GitLab, an open-source DevOps platform, that may enable a…
David Artykov
Mar 4, 2022
Thousands of people have downloaded this data-stealing Android app
Thousands of people have downloaded this data-stealing Android app
In an effort to seize identities and two-factor authentication tokens, cybercriminals have effectively hidden a banking Trojan on the…
David Artykov
Mar 4, 2022
CISA and the FBI have issued warnings about the possibility of data wiping attacks
CISA and the FBI have issued warnings about the possibility of data wiping attacks
Data wiping assaults targeting Ukraine could spread to targets in other countries, according to the Cybersecurity and Infrastructure…
David Artykov
Mar 1, 2022
Facebook has made it impossible for Russian state media to advertise on the platform
Facebook has made it impossible for Russian state media to advertise on the platform
During the continuing war in Ukraine, Facebook has blocked state-run Russian news organizations from advertising and selling content on the…
David Artykov
Feb 27, 2022
Ads on RT and other Russian channels are no longer allowed on YouTube
Ads on RT and other Russian channels are no longer allowed on YouTube
According to Reuters, YouTube is preventing state-owned Russian media outlets from advertising and generating money on the platform…
David Artykov
Feb 27, 2022
A cyber attack on Nvidia is said to have ‘totally compromised’ the company
A cyber attack on Nvidia is said to have ‘totally compromised’ the company
According to a fresh report from The Telegraph, components of America’s largest microchip manufacturer were forced offline for two days. As…
David Artykov
Feb 26, 2022
Malware that hijacks social media is spreading via Microsoft Store games
Malware that hijacks social media is spreading via Microsoft Store games
More than 5,000 Windows workstations in Sweden, Bulgaria, Russia, Bermuda, and Spain have been infected by a new malware capable of…
David Artykov
Feb 26, 2022
The price of bitcoin has dropped as a result of Russia’s invasion of Ukraine
The price of bitcoin has dropped as a result of Russia’s invasion of Ukraine
Early Thursday, the price of bitcoin dropped below $35,000 as Russian President Vladimir Putin declared a military campaign in Ukraine’s…
David Artykov
Feb 25, 2022
Due to censorship concerns, Russia is ‘partially restricting’ Facebook access
Due to censorship concerns, Russia is ‘partially restricting’ Facebook access
After Russia’s ministry of communications accused the social network of unlawful censorship, the Russian government proceeded to “partially…
David Artykov
Feb 25, 2022
From March, Google Chat will completely replace traditional Hangouts for Workspace users
From March, Google Chat will completely replace traditional Hangouts for Workspace users
If you are using Google Workspace, the traditional Hangouts messaging service will begin to expire next month as part of the Google Chat…
David Artykov
Feb 23, 2022
WordPress Backup Plugin with Over 3 Million Sites Discovered to Have a Critical Flaw
WordPress Backup Plugin with Over 3 Million Sites Discovered to Have a Critical Flaw
UpdraftPlus, a WordPress plugin with over three million downloads, has been patched to address a “serious” security flaw that can be used…
David Artykov
Feb 21, 2022
Cybercriminals use Microsoft Teams chat rooms to spread malware
Cybercriminals use Microsoft Teams chat rooms to spread malware
Some hackers are exploiting Microsoft Teams accounts, according to security researchers, in order to enter into chats and transmit…
David Artykov
Feb 18, 2022
Pixelated text from redacted documents can be restored with the tool called “Unredacter”
Pixelated text from redacted documents can be restored with the tool called “Unredacter”
Pixelation, a method of blurring letters, may not be as safe as originally believed. While opaque black stripes are the most reliable…
David Artykov
Feb 17, 2022
About Purple Team
Latest Stories
Archive
About Medium
Terms
Privacy
Teams