HookDump – Security Product Hook Detection
EDR function hook dumping Please refer to the Zeroperil blog post for more information https://zeroperil.co.uk/hookdump/Building sourceIn order to build this...
EDR function hook dumping Please refer to the Zeroperil blog post for more information https://zeroperil.co.uk/hookdump/Building sourceIn order to build this...
subdomains by looking at Google Analytics IDs > Python/GO versions > By @JosueEncinar ">> Get related domains / subdomains by...
Researchers from FireEye warn that China-linked APT groups continue to target Pulse Secure VPN devices to compromise networks. Cybersecurity researchers...
Microsoft experts uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind SolarWinds hack. Microsoft Threat Intelligence...
Canada Post disclosed a ransomware attack on a third-party service provider that exposed shipping information for their customers. Canada Post...
The FBI revealed that foreign hackers compromised the network of a local US municipal government by exploiting flaws in an...
The US Department of Homeland Security (DHS) has announced new cybersecurity requirements for critical pipeline owners and operators. The Colonial pipeline...
Summary: NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in...
Summary: NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where there is the potential to...
Summary: A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco...
Summary: NVIDIA Windows GPU Display Driver for Windows, R390 driver branch, contains a vulnerability in its installer where an attacker...
Summary: The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression...
An aerial view of a wastewater treatment plant in California. An attempt to poison the Oldsmar, Florida water supply by...
As cybersecurity products evolve to better protect against new forms of malware, trickier evasion techniques, and more organized cybercrime campaigns,...
The Portable Document Format (PDF) file type is one of the most common file formats in use today. It’s value...
Healthcare and ransomware are in the news in a big way. Data leaks are inevitable, but those are typically associated...
The state-owned postal service, Canada Post has reported that a cyber-attack on a third-party provider resulted in a data breach...
The press service of the Moscow Department of Information Technologies informs that the specialists of the Scientific-Research Institute of Metallurgical...
Social media companies such as Facebook, Twitter, YouTube, Instagram, and WhatsApp will lose their status as ‘intermediaries” that granted them...
A security researcher identified the first-ever vulnerability in Apple M1 chips that requires a silicon redesign to fix. The good...
Tens of thousands of Google Chrome extensions accessible from the official Chrome Online Store manipulate security headers on major websites,...
Low to medium Ubuntu Core honeypot coded in Python.FeaturesOptional Login Prompt Logs commands used and IP addresses Customize MOTD, Port,...
fsp scans an APK and checks the Firestore database for rules that are not secure, testing with or without authentication....
NASA identified more than 6,000 cyber-related incidents in the last four years, according to a report published by its Office...