Homepage
Open in app
Sign in
Get started
Purple Team
Help cybersecurity professionals to enhance their knowledge.
Write For Us
Archive
White Hat Institute
Follow
Anyone can now generate bogus Chrome browser windows thanks to a new phishing toolkit
Anyone can now generate bogus Chrome browser windows thanks to a new phishing toolkit
Red teamers and cybercriminals may now develop successful single sign-on phishing login forms using phony Chrome browser windows thanks to…
David Artykov
Mar 22, 2022
Exploiting SQL injection vulnerabilities
Exploiting SQL injection vulnerabilities
SQL Injection is a sort of infusion assault that makes it conceivable to execute malicious SQL statements. These statements control a…
David Artykov
Jul 10, 2020
Several Security Flaws Identified in Major Software Package Managers
Several Security Flaws Identified in Major Software Package Managers
Multiple security flaws have been discovered in major package managers that, if exploited, might allow attackers to run arbitrary code and…
David Artykov
Mar 11, 2022
AI and Data: Balancing Progress, Privacy, and Security
AI and Data: Balancing Progress, Privacy, and Security
With ChatGPT dominating the tech and other news, the concern about data security might have momentarily taken a back seat. Yet, the…
Patricia de Hemricourt
Apr 30, 2023
The Synergy of Cyber Threat Intelligence and Military Intelligence: How They Complement Each Other
The Synergy of Cyber Threat Intelligence and Military Intelligence: How They Complement Each Other
In today’s world, national security is not just a matter of physical threats but also virtual ones. As we rely more and more on technology…
Ravishanka Silva
Mar 13, 2023
Python Telnet Honeypot
Python Telnet Honeypot
Python Telnet Honeypot
Siber Güvenlik Ve Yazilim
Feb 14, 2023
Cybersecurity and Cryptocurrencies — How do they interact?
Cybersecurity and Cryptocurrencies — How do they interact?
Cybersecurity professionals wrinkle their noses at the mere mention of cryptocurrency, immediately associating it with crypto crimes. This…
Patricia de Hemricourt
Jan 9, 2023
Python APT1 Simulator
Python APT1 Simulator
Python APT1 Simulator
Siber Güvenlik Ve Yazilim
Nov 13, 2022
PHP Source Code Analysis
PHP Source Code Analysis
PHP Source Code Analysis
Siber Güvenlik Ve Yazilim
Nov 1, 2022
SOAR Development with Python
SOAR Development with Python
SOAR Development with Python
Siber Güvenlik Ve Yazilim
Oct 27, 2022
Pywirt — Python Windows Incident Response Toolkit
Pywirt — Python Windows Incident Response Toolkit
Pywirt — Python Windows Incident Response Toolkit
Siber Güvenlik Ve Yazilim
Oct 23, 2022
Murenshark Detection Sigma Rules
Murenshark Detection Sigma Rules
Murenshark Detection Sigma Rules
Siber Güvenlik Ve Yazilim
Aug 22, 2022
What is OSINT
What is OSINT
We have been trying to find someone online, specifically perhaps by using an email address, or username. Here the use of OSINT comes.
Abhinav Pathak
Aug 6, 2022
How to Protect your Online Privacy
How to Protect your Online Privacy
In today's world where Privacy is only a Myth, we can do whatever things to protect our privacy but the data stolen by Hackers, Data…
Abhinav Pathak
Jul 22, 2022
Bahamut Android Malware Sigma Rule
Bahamut Android Malware Sigma Rule
Bahamut Android Malware Sigma Rule
Siber Güvenlik Ve Yazilim
Jun 30, 2022
GlowSand Sigma Rule
GlowSand Sigma Rule
GlowSand Sigma Rule
Siber Güvenlik Ve Yazilim
Jun 30, 2022
BlackGuard Stealer Targets the Gaming Community Sigma Rule
BlackGuard Stealer Targets the Gaming Community Sigma Rule
BlackGuard Stealer Targets the Gaming Community Sigma Rule
Siber Güvenlik Ve Yazilim
Jun 28, 2022
BRONZE STARLIGHT Ransomware Operations Use HUI Loader Sigma Rules
BRONZE STARLIGHT Ransomware Operations Use HUI Loader Sigma Rules
BRONZE STARLIGHT Ransomware Operations Use HUI Loader Sigma Rules
Siber Güvenlik Ve Yazilim
Jun 27, 2022
Unidentified RAT Sigma Rule
Unidentified RAT Sigma Rule
Unidentified RAT Sigma Rule | Threat Hunting | SO
Siber Güvenlik Ve Yazilim
Jun 26, 2022
Cerber2021 Ransomware Back in Action(CerberImposter)
Cerber2021 Ransomware Back in Action(CerberImposter)
Siber Güvenlik Ve Yazilim
Jun 21, 2022
The Four V’s of Effective Cybersecurity Posture
The Four V’s of Effective Cybersecurity Posture
There are four critical angles to achieve optimal cyber defense: Visibility, verification, vigilance, and validation. Rapid development…
Patricia de Hemricourt
Jun 12, 2022
Twisted Panda Sigma Rules
Twisted Panda Sigma Rules
Siber Güvenlik Ve Yazilim
May 22, 2022
Mustang Panda New Wave Malware
https://raw.githubusercontent.com/anil-yelken/sigma-rules/main/MustangPandaNewWaveMalware.yml
Siber Güvenlik Ve Yazilim
May 19, 2022
Since January, the Android trojan has been present on the Google Play Store
Since January, the Android trojan has been present on the Google Play Store
Cybersecurity experts monitoring the mobile app ecosystem have seen an increase in trojan infections on the Google Play Store, with one of…
David Artykov
Mar 16, 2022
Ford will ship and sell cars that are lacking chips
Ford will ship and sell cars that are lacking chips
According to Automotive News, Ford will likely start manufacturing and shipping unfinished, but driveable vehicles that lack the chips that…
David Artykov
Mar 13, 2022
Microsoft has patched a severe Azure problem that exposed client information
Microsoft has patched a severe Azure problem that exposed client information
Microsoft has patched a flaw in the Azure Automation service that may have enabled intruders to take full control of data belonging to…
David Artykov
Mar 8, 2022
Microsoft has halted all new sales in Russia
Microsoft has halted all new sales in Russia
In response to Russia’s “unjustified, unprovoked, and illegitimate invasion” of Ukraine, Microsoft declared that it will halt all…
David Artykov
Mar 6, 2022
Thousands of GitLab instances are affected by a new security flaw.
Thousands of GitLab instances are affected by a new security flaw.
Security researchers have revealed details of a now-patched security flaw in GitLab, an open-source DevOps platform, that may enable a…
David Artykov
Mar 4, 2022
About Purple Team
Latest Stories
Archive
About Medium
Terms
Privacy
Teams