>_ Case Files
Browse the full archive. Every breach dissected. Every exploit explained. Every case filed.
Showing 13-20 of 20 cases
Wireshark: See Every Packet on Any Network
Wireshark is the world's most popular network protocol analyzer. It lets you capture and inspect every single packet flo...
Metasploit: Thousands of Exploits, Completely Free
Metasploit is the world's most popular penetration testing framework. Thousands of exploits, hundreds of payloads, and a...
Nmap: The First Tool Every Hacker Runs
Nmap is the most iconic network scanner in cybersecurity. It's the first tool in every penetration tester's toolkit and ...
Kevin Mitnick: America's Most Wanted Hacker
Kevin Mitnick was once the most wanted computer criminal in the United States. He hacked into IBM, Nokia, Motorola, and ...
One Zero-Day Exposed 77 Million People - MOVEit/Clop
In May 2023, the Clop ransomware gang exploited a zero-day vulnerability in MOVEit Transfer — a widely used file trans...
They Hacked 18,000 Companies Through a Software Update - SolarWinds
In 2020, Russian intelligence operatives compromised SolarWinds Orion — a network monitoring tool used by 300,000 orga...
A $10 Domain Name Stopped a Global Cyberattack - WannaCry
In May 2017, the WannaCry ransomware worm tore through 150 countries in hours, crippling hospitals, banks, and telecom c...
One Password Shut Down 45% of US Fuel - Colonial Pipeline
In May 2021, a single compromised password led to a ransomware attack that shut down the Colonial Pipeline — the large...