E9Patch – A Powerful Static Binary Rewriting Tool
E9Patch is a powerful static binary rewriting tool for x86_64 Linux ELF binaries. E9Patch is: Scalable: E9Patch can reliably rewrite...
E9Patch is a powerful static binary rewriting tool for x86_64 Linux ELF binaries. E9Patch is: Scalable: E9Patch can reliably rewrite...
PoshBot is a chat bot written in PowerShell. It makes extensive use of classes introduced in PowerShell 5.0. PowerShell modules...
Are you tired of being the cybersecurity help desk for everyone you know? Are you frustrated with spending all your...
Since the launch of InsightVM’s Custom Policy Builder in June of this year, hundreds of organizations have created and customized...
Avast researchers reported that three million users installed 28 malicious Chrome or Edge extensions that could perform several malicious operations....
On 11th December 2020, the Observatory for the Protection of the National Strategic Industrial System (OSSISNa) was officially announced. On...
KELA researchers analyzed a database recently leaked online that contains data for 1.9 million Chinese Communist Party members in Shanghai....
Microsoft, FireEye, and GoDaddy have partnered to create a kill switch for the Sunburst backdoor that was employed in the...
HPE has disclosed a zero-day vulnerability in the latest versions of its HPE Systems Insight Manager (SIM) software for both...
Posted by SEC Consult Vulnerability Lab on Dec 17SEC Consult Vulnerability Lab Security Advisory < 20201217-0 > ======================================================================= title: Multiple...
Recently, Malwarebytes discovered a potential lead generation scam targeting companies that are interested in our Malwarebtyes Managed Service Provider (MSP)...
Earlier this week, in a press conference, Facebook closed two misinformation networks related to Russia, one of which was associated...
Police officers of the Chuvash Republic, with the assistance of BI.ZONE experts detained the organizers of a criminal group that...
Freki is a free and open-source malware analysis platform.GoalsFacilitate malware analysis and reverse engineering; Provide an easy-to-use REST API...
About Ghost FrameworkGhost Framework is an Android post-exploitation framework that exploits theAndroid Debug Bridge to remotely access an Android device....
Happy HaXmas, everyone! This has been quite the year, but we’re thrilled that we’re able to keep up our favorite...
The European Union is going to unveil two laws, the Digital Services and Digital Markets Acts, that will impose new...
Security experts spotted a new malware strain, named Goontact, that allows its operators to spy on both Android and iOS...
Microsoft and its partners have seized the primary domain used in the SolarWinds attack to identify the victims through sinkholing....
Experts discovered a new Windows info-stealer, named PyMICROPSIA, linked to AridViper group that is rapidly evolving to target other platforms....
Experts reported flaws in Medtronic ’s MyCareLink Smart 25000 Patient Reader product that could be exploited to take control of...
Norwegian cruise company Hurtigruten disclosed a cyber attack that impacted its entire worldwide digital infrastructure. The Norwegian cruise company Hurtigruten...
Researchers at Kaspersky discovered an average of 360,000 new malicious files every day over the past 12 months – 18,000...
What is Egregor? Egregor ransomware is a relatively new ransomware (first spotted in September 2020) that seems intent on making...