Skip to content

AegisLens

Cyber Security Blog

  • News
  • Blog
    • Cyber Security
    • Tools
    • EDR & XDR
    • SIEM
    • Attacks
    • Darknet
    • Hackers
    • Encryption
  • Tools & Projects
    • URL Scoring Tool
      • URL Scanner
      • URL Scoring Data Downloads
    • Password Compromise Checker
  • Privacy Policy
The impact of remote work on cyber security in the new normal
  • Cyber Security
  • News

The impact of remote work on cyber security in the new normal

  • CCyrus
  • 10 February 2023
  • 0
The top cyber security threats to look out for in 2023
  • Artificial Intelligence
  • Attacks
  • Hackers
  • Malware
  • Ransomware
  • Social Engineering
  • Tools

The top cyber security threats to look out for in 2023

  • CCyrus
  • 10 February 2023
  • 0
Top 5 Penetration Testing Tools
  • Attacks
  • Cyber Security
  • Hackers
  • Tools

Top 5 Penetration Testing Tools

  • CCyrus
  • 10 February 2023
  • 0
Using Burp Suite
  • Attacks
  • Cyber Security
  • How To
  • Tools

Using Burp Suite

  • CCyrus
  • 10 February 2023
  • 0
Using SQLMap
  • Attacks
  • Cyber Security
  • Hackers
  • How To
  • Tools

Using SQLMap

  • CCyrus
  • 10 February 2023
  • 0
Using OWASP ZAP
  • Cyber Security
  • How To
  • Tools

Using OWASP ZAP

  • CCyrus
  • 10 February 2023
  • 0
How to Use Metasploit for Penetration Testing
  • Cyber Security
  • How To
  • Tools

How to Use Metasploit for Penetration Testing

  • CCyrus
  • 10 February 2023
  • 0
Scanning ports in PHP
  • Code & Scripts
  • php

Scanning ports in PHP

  • CCyrus
  • 9 February 2023
  • 0
The Cult of the Dead Cow (CDC)
  • Cyber Security
  • Hackers
  • News

The Cult of the Dead Cow (CDC)

  • CCyrus
  • 9 February 2023
  • 0
The Equifax Data Breach: A Wake-Up Call for Cybersecurity
  • Attacks
  • Cyber Security
  • News

The Equifax Data Breach: A Wake-Up Call for Cybersecurity

  • CCyrus
  • 9 February 2023
  • 0

Posts navigation

Prev 1 2 3 4 5 … 10 Next

Recent Posts

  • Boosting Web Security Testing with Accunetix: Exploring Automation Features for Time-Saving and Improved Accuracy
  • Phishing Alert: How to Protect Yourself from SMS and Instant Messenger Scams.
  • The Dark Side of Social Media: How Your Information is Being Used Against You
  • 10 Common Cybersecurity Mistakes You’re Probably Making (And How to Fix Them)
  • Using Wireshark

Blog

  • Artificial Intelligence (2)
  • Attacks (41)
  • Botnets (2)
  • Code & Scripts (1)
  • Cyber Security (71)
  • Darknet (4)
  • EDR & XDR (7)
  • Encryption (3)
  • Hackers (13)
  • How To (7)
  • Malware (11)
  • News (34)
  • php (1)
  • Ransomware (13)
  • SIEM (5)
  • Social Engineering (4)
  • Tools (19)
  • Vulnerabilities (3)

RSS Threat Watch Archive – Binary Defense

  • New Infostealer “MacStealer” Targets macOS 27 March 2023
  • U.K. National Crime Agency Creates DDoS-for-Hire Websites to Trap Threat Actors 27 March 2023
  • Vice Society Strikes Against Puerto Rico Critical Infrastructure 27 March 2023
  • Bitter APT Targeting Chinese Nuclear Energy Organizations 24 March 2023
  • Watch Out for These Tax Season Scams 24 March 2023

RSS malware – Threatpost

  • SolarWinds Hack Potentially Linked to Turla APT 11 January 2021
  • Malicious Software Infrastructure Easier to Get and Deploy Than Ever 8 January 2021
  • Ryuk Rakes in $150M in Ransom Payments 8 January 2021
  • FBI Warns of Egregor Attacks on Businesses Worldwide 8 January 2021
  • It’s Not the Trump Sex Tape, It’s a RAT 6 January 2021

Cream Magazine by Themebeez

  • Password Checker