CrowdStrike releases free Azure tool to review assigned privileges
CrowdStrike released a free Azure security tool after it was notified by Microsoft of a failed attack leveraging compromised Azure...
CrowdStrike released a free Azure security tool after it was notified by Microsoft of a failed attack leveraging compromised Azure...
The North Korea-linked Lazarus APT group has recently launched cyberattacks against at least two organizations involved in COVID-19 research. The...
Disclaimer: I do NOT want you to read this if you have not even tried to attempt any of it...
On 24th December, E-Hacking News conducted an interesting interview with Mr. Narendra Bhati, a Bug Bounty Hunter/Ethical Hacker. He was...
Posted by Reed Loden on Dec 25Due to a process fail, this CVE ID was accidentally reused for another vulnerability....
Posted by Reed Loden on Dec 25Due to a process fail, this CVE ID was accidentally reused for another vulnerability....
Posted by CarolinaCon on Dec 25We hope this email finds you well. This year has had its challenges and we...
Posted by Ilia Shnaidman on Dec 25 Credits: Ilia Shnaidman @0x496c on Twitter https://www.iliashn.com Vendor: ============= Philips Lighting Holding B.V...
Posted by Jason Geffner on Dec 25Thanks, Reed. I've updated the GitHub repository name to reflect this change. The detailed...
Aura is a static analysis framework developed as a response to the ever-increasing threat of malicious packages and vulnerable code...
Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS...
As requested, your dutiful elves here at Rapid7 Labs have compiled a list of the naughty country networks being used...
Russian cryptocurrency exchange Livecoin was compromised on Christmas Eve, hackers breached its network and gained control of some of its...
Citrix confirmed that a DDoS attack is targeting Citrix Application Delivery Controller (ADC) networking equipment. The threat actors are using...
Millions of devices are potential exposed to attacks targeting the vulnerabilities exploited by the tools stolen from the arsenal of...
Hello Folks! In this Videobyte, we’re talking about what penetration testing tools malware gangs love to use and why they...
As the year is coming to a wrap, the 2020 holiday season is being actively attacked by malicious actors. In recent...
19 tech companies, cybersecurity firms, and non-profits have collaborated with the Institute for Security and Technology (IST) to form a...
An easy-to-use and lightweight API wrapper for the Censys Search Engine (censys.io). Python 3.6+ is currently supported.Getting StartedThe library can...
Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features.UsageHelp$ ./webserver -helpweb subcommand -bind...
Happy HaXmas! We hope everyone is having a wonderful holiday season so far. This year has been wild and unpredictable,...
Google’s Project Zero experts publicly disclosed details of an improperly patched zero-day code execution vulnerability in Windows. White hat hackers...
GRecon (Greei-Conn) is a simple python tool that automates the process of Google Based Recon AKA Google Dorking The current...
For this year's HaXmas, we're giving the gift of Metasploit knowledge! We'll cover a mix of old, new, or recently...