Cyber security 2021 : What new threats can be expected?; here is our estimate
2020 has been an event-full year for cybersecurity, to say the least COVID-19 completely shifted the paradigm for the 184...
2020 has been an event-full year for cybersecurity, to say the least COVID-19 completely shifted the paradigm for the 184...
dnsx is a fast and multi-purpose DNS toolkit allow to run multiple probers using retryabledns library, that allows you to...
Damn Vulnerable Bank Android Application aims to provide an interface for everyone to get a detailed understanding with internals and...
A data breach attack recently hit Sophos, a Uk based cybersecurity company. The company currently has notified its customers regarding...
In the city of Lagos, three Nigerian nationals suspected of participation in an organized cybercrime group behind malware distribution, phishing...
N1QLMap is an N1QL exploitation tool. Currently works with Couchbase database. The tool supports data extraction and performing SSRF attacks...
nginx Docker image secure by default. Avoid the hassle of following security best practices each time you need a web...
Days before taking a week-long Thanksgiving recess, the US Senate passed an almost mundane cybersecurity bill that, if approved by...
A team of researchers working for vpnMentor has found a treasure trove in the form of an unsecured Elasticsearch database...
With 400 Million monthly active users (a 30% increase from last year), Pinterest is gaining foot among millennials and Gen...
Scammers have now begun taking advantage of the Minecraft sandbox video clip game’s wild accomplishment by building Google Play applications.These...
An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server.InstallationRedShell runs...
wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB"). The sandbox is used by Windows Defender...
Anyone who uses Malwarebytes software is probably familiar with the fact that, in addition to things like malware and adware,...
Earlier this month, Zoom’s stock price took a dive on news of two promising COVID vaccines offering over 90 percent...
Anton Kardanov, head of the information security sector at AT Consulting, warned that motion recognition systems can be used by...
Chinese state-sponsored threat actors have been observed exploiting the Zerologon vulnerability in a global campaign targeting businesses from multiple industries...
Our colleagues already delved into how cybercriminals attack companies through compromised email addresses of employees, and how to protect against...
Directed Greybox Fuzzing (DGF) like AFLGo aims to perform stress testing on pre-selected potentially vulnerable target locations, with applications to...
Xerror is an automated penetration tool , which will helps security professionals and non professionals to automate their pentesting tasks....
OpenCRX version 4.30 and version 5.0-20200717 suffers from an unverified password change vulnerability, which is an instance of CWE-620. This...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
On 19 November, E-Hacking News conducted an interesting interview with Sepio Systems. The company provides its customers with the highest...
ToothPicker is an in-process, coverage-guided fuzzer for iOS. It was developed to specifically targets iOS's Bluetooth daemon bluetoothd and to...