2021 Detection and Response Planning, Part 3: Why 2021 Is the Year for SOC Automation
In this third installment of our series around 2021 security planning, we’re focused on SOC automation. In part one, we...
In this third installment of our series around 2021 security planning, we’re focused on SOC automation. In part one, we...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Google has recently released Chrome version 86.0.4240.111 to patch several holes. One is for a zero-day flaw – that means...
jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and...
An extensible application for penetration testers and software developers to decode/encode data into various formats.SetupDecoder++ can be either installed by...
When you start out with one of our vulnerability management solutions, Nexpose or InsightVM, one of the first things you...
The US Senate Judiciary Committee has asked the CEO of Twitter and Facebook to evaluate their role in “platforms’...
Cybercriminals are using a newly created Artificial Intelligence bot to generate and share deepfake nude images of women on the...
Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence...
Manuka is an Open-source intelligence (OSINT) honeypot that monitors reconnaissance attempts by threat actors and generates actionable intelligence for Blue...
The Treasury Department’s Office of Foreign Assets Control sanctioned a Russian government research institution linked to Triton malware targeting industrial...
As the U.S. presidential elections are approaching, the hacking and spamming attacks related to it are rising. In a similar...
Cyber attack prevention experts recorded a sharp increase in the number of cyber threats and outlined the main trends in...
Malware Mutation using Deep Reinforcement Learning and GANsThe purpose of the tool is to use artificial intelligence to mutate a...
What’s AutoGadgetFS ?AutoGadgetFS is an open source framework that allows users to assess USB devices and their associated hosts/drivers/software without...
With involvement in an 'unrestricted huge hacking campaign', which incorporates the famous Petya ransomware attacks which have focused mainly...
NoSQL scanner and injector. About NosqliI wanted a better nosql injection tool that was simple to use, fully command line...
GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I've compiled...
For modern Managed Service Providers (MSPs), gone are the days of disparate workflows, and that’s really for the best. Imagine...
Announcing the possible appearance of the digital ruble, the Russian Central Bank joined dozens of world Central banks that have...
In the part of their attacks on companies and government agencies in the broader Middle East region, an Iranian cyberattack...
As protection methods improve, the developers of miners have had to enhance their own creations, often turning to non-trivial solutions....
""" What is this register used for? Hmm.. I'll just rename it to veryuniquename, do a textual search, and find...
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format....