Please turn JavaScript on
HACKLIDO icon

HACKLIDO

Following HACKLIDO's news feed is very easy. Subscribe using the "follow" button on the top right and if you want to, choose the updates by topic or tag.

We will deliver them to your inbox, your phone, or you can use follow.it like your own online RSS reader. You can unsubscribe whenever you want with one click.

Keep up to date with HACKLIDO!

HACKLIDO: HACKLIDO

Is this your feed? Claim it!

Publisher:  Unclaimed!
Message frequency:  1.17 / day

Message History


When people think about malware, they usually imagine a file: something you can scan, detect, and delete.

But what if there was no file at all?

No suspicious download.
No obvious program.
Nothing stored on the disk.

And yet… the system is compromised.

This is the world of fileless malware.

What is Fileless Mal...

Read full story

It might look like just a small USB drive.

But in digital forensics, a USB device can carry far more than just files.

It can contain malware, stolen data, hidden scripts, or traces of unauthorized activity.

And sometimes, a single USB device can reveal an entire story.

Why USB Devices Are Important in Investigations

U...


Read full story

When people think about digital evidence, they usually imagine files stored on a hard drive.

But some of the most valuable evidence doesn’t live on disk…

It lives in memory (RAM) and disappears the moment a system is turned off.

This is where memory forensics becomes incredibly important.

What is Memory F...

Read full story

Machine Learning models are everywhere from facial recognition to fraud detection. But what if an attacker could fool a model without even accessing it?

That’s where Transfer Attacks come in one of the most practical and dangerous techniques in AI Security.

In this blog, you’ll learn:
What is an Evasion Attack
Difference between Adversarial vs...


Read full story
Powershell Without Powershell.exe

Powershell.exe is just a process hosting the System.Management.Automation.dll which essentially is the actual Powershell as we know it.

If you run into a situation where powershell.exe is blocked and no strict application whitelisting is implemented, there are ways to execute powershell still.

PowerShdll rundll32.exe PowerShdll...

Read full story