Hetty – An HTTP Toolkit For Security Research
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like...
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like...
It is becoming more and more difficult to find out whether you are being followed through a webcam. According to...
Using this script, you can configure a number of JavaScript files on websites that you want to monitor. Everytime you...
Threagile (see https://threagile.io for more details) is an open-source toolkit for agile threat modeling: It allows to model an architecture...
Apple has patched three vulnerabilities in iOS (and iPadOS) that were actively being exploited in targeted attacks. Vulnerabilities that are...
Every organization in the financial industry needs to meet certain regulatory obligations, even if it’s just filing a tax return...
According to Anton Averin, Deputy Director of the Institute of Information Technologies of the Synergy University, if you wish and...
We recently discovered a new file-encrypting Trojan built as an ELF executable and intended to encrypt data on machines controlled...
GWTMap is a tool to help map the attack surface of Google Web Toolkit (GWT) based applications. The purpose of...
Posted by Tobias Glemser on Nov 06secuvera-SA-2020-01: Broken Object Level Authorization Vulnerability in OvulaRing-Webapplication Affected Products OvulaRing Webapp Version 4.2.2...
Posted by Sandro Gauci on Nov 06# Asterisk crash due to INVITE flood over TCP - Fixed versions: 13.37.1, 16.14.1,...
Posted by Apple Product Security via Fulldisclosure on Nov 06APPLE-SA-2020-11-05-7 tvOS 14.2 tvOS 14.2 is now available and address the...
Posted by Apple Product Security via Fulldisclosure on Nov 06APPLE-SA-2020-11-05-1 iOS 14.2 and iPadOS 14.2 iOS 14.2 and iPadOS 14.2...
Posted by Apple Product Security via Fulldisclosure on Nov 06APPLE-SA-2020-11-05-2 iOS 12.4.9 iOS 12.4.9 is now available and address the...
tempomail is a standalone binary that allows you to create a temporary email address in 1 Second and receive emails....
An intense presidential election and a grueling week of vote counting has left many Americans distracted from their work, anxious...
First-day returns in California showed voters firmly approving to change their state’s current data privacy law—which already guarantees certain privacy...
Google has recently introduced a fix for another zero-day bug in its Chrome browser and has also released a new...
The document obliges citizens to report to the Federal Tax Service on the movement of funds in their foreign electronic...
The operators of the infamous Maze Ransomware has said a bitter (for some a very sweet) goodbye. Maze Ransomware incepted...
Download full report (PDF) Executive Summary In summer 2019, Kaspersky ICS CERT identified a new wave of phishing emails containing...
Kraken is a simple cross-platform Yara scanner that can be built for Windows, Mac, FreeBSD and Linux. It is primarily...
Instagram offers two kinds of APIs to developers. The Instagram API Platform (extremely limited in functionality and close to being...
Posted by Asterisk Security Team on Nov 05 Asterisk Project Security Advisory â AST-2020-002 Product Asterisk Summary Outbound INVITE loop...