CISA Released A New Advisory on LokiBot Trojan
LokiBot, a trojan-type malware first identified in 2015 is popular amid cybercriminals as a means of creating a backdoor into...
LokiBot, a trojan-type malware first identified in 2015 is popular amid cybercriminals as a means of creating a backdoor into...
PwnedPasswordsChecker is a tool that checks if the hash of a known password (in SHA1 or NTLM format) is present...
A set of scripts to help perform an online dictionary attack against a WPA3 access point. Wacker leverages the wpa_supplicant...
The Ministry of Digital Development of Russia wants to ban the use of experimental encryption protocols DNS over TLS, DNS...
While Q2 of this year saw an overall 8% decrease in malware attacks, 70% of them were zero-day attack (attacks...
.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py. By default runs in the context...
Velociraptor is a tool for collecting host based state information using Velocidex Query Language (VQL) queries. To learn more about...
The fastest dork scanner written in Go. There are also various search engines supported by go-dork, including Google, Shodan, Bing,...
A powerful XSS scanner made in python 3.7InstallingRequirements: BeautifulSoup4 pip install bs4 requests pip install requests python 3.7 Commands: git...
For the past several months, Taurus Project—a relatively new stealer that appeared in the spring of 2020—has been distributed via...
To better understand modern malware detection methods, it’s a good idea to look at sandboxes. In cybersecurity, the use of...
According to cybersecurity firm Akamai's recent report titled "State of the Internet/Security," the gaming sector has suffered a big hit...
Global police agencies have confiscated over $6.5m both in cash and virtual currencies, 64 firearms, and 1,100 pounds of drugs...
Group-IB recorded a successful attack by the criminal group OldGremlin on a Russian medical company. The attackers completely encrypted its...
Overall downward trend for percentages of attacked computers globally Beginning in H2 2019 we have observed a tendency for decreases...
Posted by Apple Product Security via Fulldisclosure on Sep 24APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005 High Sierra,...
Welcome to the Microsoft Defender Advanced Threat Protection PowerShell module! This module is a collection of easy-to-use cmdlets and functions...
SitRep is intended to provide a lightweight, extensible host triage alternative. Checks are loaded dynamically at runtime from stand-alone files....
“It happens to the best of us.” And, indeed, no adage is better suited to a phishing campaign that recently...
Ukrainian IT company SoftServe has issued an official statement about the recent hacker attack, in which it gave details of...
With hopes to upgrade the U.S. government's approach to deal with its maritime cybersecurity strategy in the coming months, the...
One of the motivations for this post is to encourage other researchers who are interested in this topic to join...
A Linux alternative to enum.exe for enumerating data from Windows and Samba hosts. Enum4linux is a tool for enumerating information...
DNX Firewall is an optimized/high performance collection of applications or services to convert a standard linux system into a zone...