Hacker Spotlight: Interview with ‘Cyberboy’, Bug Bounty Hunter who Won $3000
A few days ago Indian bug bounty hunter, Shashank aka Cyberboy came up with a creative hack that led him...
A few days ago Indian bug bounty hunter, Shashank aka Cyberboy came up with a creative hack that led him...
Guildma, a threat actor that is part of the Tétrade family of banking trojans, has been working on bringing in...
Web Application Security Recon Automation FrameworkIt takes user input as a domain name and maximize the attack surface area by...
A web application that makes it easy to run your pentest and bug bounty projects.DescriptionThe app provides a convenient web...
The Belfast Team Partaking in #Rapid7GivesBack Month If you like the site, please consider joining the telegram channel or supporting...
In a recent report by cybersecurity firm Kaspersky, experts explained how there were certain modifications in attack campaign strategies and...
This month Apple released iOS 14.2 and iPad 14.2, which patched up a sum total of 24 vulnerabilities in different...
The ShowStopper project is a tool to help malware researchers explore and test anti-debug techniques or verify debugger plugins or...
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like...
It is becoming more and more difficult to find out whether you are being followed through a webcam. According to...
Using this script, you can configure a number of JavaScript files on websites that you want to monitor. Everytime you...
Threagile (see https://threagile.io for more details) is an open-source toolkit for agile threat modeling: It allows to model an architecture...
Apple has patched three vulnerabilities in iOS (and iPadOS) that were actively being exploited in targeted attacks. Vulnerabilities that are...
Every organization in the financial industry needs to meet certain regulatory obligations, even if it’s just filing a tax return...
According to Anton Averin, Deputy Director of the Institute of Information Technologies of the Synergy University, if you wish and...
We recently discovered a new file-encrypting Trojan built as an ELF executable and intended to encrypt data on machines controlled...
GWTMap is a tool to help map the attack surface of Google Web Toolkit (GWT) based applications. The purpose of...
Posted by Tobias Glemser on Nov 06secuvera-SA-2020-01: Broken Object Level Authorization Vulnerability in OvulaRing-Webapplication Affected Products OvulaRing Webapp Version 4.2.2...
Posted by Sandro Gauci on Nov 06# Asterisk crash due to INVITE flood over TCP - Fixed versions: 13.37.1, 16.14.1,...
Posted by Apple Product Security via Fulldisclosure on Nov 06APPLE-SA-2020-11-05-7 tvOS 14.2 tvOS 14.2 is now available and address the...
Posted by Apple Product Security via Fulldisclosure on Nov 06APPLE-SA-2020-11-05-1 iOS 14.2 and iPadOS 14.2 iOS 14.2 and iPadOS 14.2...
Posted by Apple Product Security via Fulldisclosure on Nov 06APPLE-SA-2020-11-05-2 iOS 12.4.9 iOS 12.4.9 is now available and address the...
tempomail is a standalone binary that allows you to create a temporary email address in 1 Second and receive emails....
An intense presidential election and a grueling week of vote counting has left many Americans distracted from their work, anxious...