ProtOSINT – A Python Script That Helps You Investigate Protonmail Accounts And ProtonVPN IP Addresses
ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.DescriptionThis tool can help you in...
ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.DescriptionThis tool can help you in...
sigurls is a reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine.UsageTo display...
This update is a continuation of our previous coverage of the SolarWinds supply-chain attack that was discovered by FireEye in...
Cybersecurity firm CrowdStrike announced to have discovered a third malware strain, named Sunspot, directly involved in the SolarWinds supply chain...
Security firm Bitdefender released a tool that allows victims of the Darkside ransomware to recover their files without paying the...
American technology company Ubiquiti Networks is disclosed a data breach and is notifying its customers via email. American technology vendor...
Experts have found some similarities between the Sunburst backdoor used in the SolarWinds supply chain attack and Turla’s backdoor Kazuar. Security experts...
Last week on Malwarebytes Labs, we released survey results about VPN usage and found that 36 percent of our respondents...
 JetBrains a software company based in the Czech Republic could possibly be used as a doorway by Russian hackers to...
 Phishing emails are scams where the actors try to befool the user by sending emails that may concern the user....
 Launched in 2018, Parler has become a place of refuge for individuals that have been prohibited or suspended by popular...
Introduction On December 13, 2020, FireEye published a blog post detailing a supply chain attack leveraging Orion IT, an infrastructure...
A pre-boot execution environment for Apple boards built on top of checkra1n.Building on macOSInstall Xcode + command-line utilities make clean...
Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.Notice:Why is the project...
A U.S. court on Thursday sentenced the Russian hacker Andrei Tyurin to 12 years in prison for his role in...
Researchers obtained gained access to the Git Repositories belonging to the United Nations, exposing staff records and credentials. The research...
The source code for the ChastityLock ransomware that was used in attacks aimed at the users of the Qiui Cellmate...
Security expert Stefan Umit Uygur, CEO and Co-Founder at 4Securitas Ltd, provided his vision about the Cyber-defence solutions on the...
In the current scenario credential theft malware is one of the most frequently employed malware in cyber hacking. Many government...
 Cybersecurity and Infrastructure Security Agency (CISA) informed that perpetrators of SolarWinds attack obtained confidential information via common hacker techniques like...
 Reserve Bank of India has forewarned Indians against unauthorized money lending apps that are increasingly rising day by day, consequently...
 On Thursday, the Cybersecurity and Infrastructure Security Agency (CISA) asked clients of Mozilla Foundation's Firefox browser and Windows, macOS, and...
This tool can be used to visualize the MUD files in JSON format. MotivationMUD files are plain text files in...
PIDRILA: Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer is really fast async web path scanner prototype developed by BrightSearch team...