[SYSS-2020-025] DOMOS 5.8 – OS Command Injection
Posted by Patrick Hener on Sep 29Advisory ID: SYSS-2020-025 Product: DOMOS Manufacturer: Secudos GmbH Affected Version(s): <= DOMOS 5.8 Tested...
Posted by Patrick Hener on Sep 29Advisory ID: SYSS-2020-025 Product: DOMOS Manufacturer: Secudos GmbH Affected Version(s): <= DOMOS 5.8 Tested...
Posted by Patrick Hener on Sep 29Advisory ID: SYSS-2020-024 Product: Qiata FTA Manufacturer: Secudos GmbH Affected Version(s): <= Qiata FTA...
Posted by Micha Borrmann on Sep 29Advisory ID: SYSS-2019-049 Product: MailDepot Manufacturer: REDDOXX GmbH Affected Version(s): 2032 SP2 (2.2.1242) Tested...
Posted by Ken on Sep 29In response to the recent OnBase v19.8.9.1000 and v18.0.0.32 vulnerability disclosures a few weeks ago,...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Spying malware "FinSpy" has come back again in Egypt. This time in new campaigns is attacking activists and protestor organizations....
 In a rather coordinated attempt in order to steal strategic data and critical infrastructure by sending phishing mails a...
Being cybersecurity ready offers many advantages, but your organization can always target hackers unless you do not know critical details....
Its been about 2-weeks since we released Empire 3.4, and hopefully, everyone has had a chance to check out all...
NERVE is a vulnerability scanner tailored to find low-hanging fruit level vulnerabilities, in specific application configurations, network services, and unpatched...
Cooolis-ms is a server that supports Metasploit Framework RPC. It is used to work for Shellcode and PE loader, bypassing...
The official website of the Ministry of Internal Affairs of Belarus, which has not worked for 19 days, is again...
Social networking giant Facebook says it terminated three fake account networks that could have been working for Russian intelligence. The...
The source code for Windows XP SP1 was leaked online today as a torrent. The person behind the leak claims...
LokiBot, a trojan-type malware first identified in 2015 is popular amid cybercriminals as a means of creating a backdoor into...
PwnedPasswordsChecker is a tool that checks if the hash of a known password (in SHA1 or NTLM format) is present...
A set of scripts to help perform an online dictionary attack against a WPA3 access point. Wacker leverages the wpa_supplicant...
 The Ministry of Digital Development of Russia wants to ban the use of experimental encryption protocols DNS over TLS, DNS...
While Q2 of this year saw an overall 8% decrease in malware attacks, 70% of them were zero-day attack (attacks...
.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py. By default runs in the context...
Velociraptor is a tool for collecting host based state information using Velocidex Query Language (VQL) queries. To learn more about...
The fastest dork scanner written in Go. There are also various search engines supported by go-dork, including Google, Shodan, Bing,...
A powerful XSS scanner made in python 3.7InstallingRequirements: BeautifulSoup4 pip install bs4 requests pip install requests python 3.7 Commands: git...
For the past several months, Taurus Project—a relatively new stealer that appeared in the spring of 2020—has been distributed via...