Decentralized Finance (Defi) Protocol Akropolis Hacked For $2 Million In DAI
Decentralized finance (defi) protocol Akropolis was recently hacked for $2 million in DAI, in the most recent flash loan attack...
Decentralized finance (defi) protocol Akropolis was recently hacked for $2 million in DAI, in the most recent flash loan attack...
Process Herpaderping is a method of obscuring the intentions of a process by modifying the content on disk after the...
Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for...
The Australian Cyber Security Center has issued a security alert for the health sector to check their barriers and defenses...
tfsec uses static analysis of your terraform templates to spot potential security issues. Now with terraform v0.12+ support. Example OutputInstallationInstall...
Scripthunter is a tool that finds javascript files for a given website. To scan Google, simply run ./scripthunter.sh https://google.com. Note...
Slightly over a week ago we advised you to update your Chrome browser. That warning came only a week or...
Social distancing, the wearing of face masks, practicing hand hygiene, and disinfecting often-touched surfaces have become human necessities during the...
(it captures the ADHD experience well) TLDR: Life can be challenging for a person with ADHD; there are hidden struggles...
A hacker from Greece has published the database of the University of Rijeka in the context of Croatia supporting the...
Google's cybersecurity team found a cluster of high-end vulnerabilities in iOS, Windows, Android, and Chrome earlier this week. According to...
Quarterly highlights Worming their way in: cybercriminal tricks of the trade These days, many companies distribute marketing newsletters via online...
LabCIF - Forensic Analysis for Mobile AppsGetting StartedAndroid extraction and analysis framework with an integrated Autopsy Module. Dump easily user...
Leonidas is a framework for executing attacker actions in the cloud. It provides a YAML-based format for defining cloud attacker...
Cybersecurity researchers discovered a new ransomware last month called RegretLocker that, despite a no-frills package, can do serious damage to...
With everything evolving around us, technology has reached another great peak when smart wallets came to the market. Being sure,...
The Czech Republic's intelligence agency recently revealed that Russian and Chinese spies posed an up and coming threat to the...
Shanmugavel Sankaran has previously worked with Microsoft and IBM in a variety of information security and compliance management positions. Now...
When we talk about ransomware, we need to draw a line between what it used to be and what it...
OctopusWAF is a open source Web application firewall, is made in C language uses libevent to make multiple connections. First...
NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching...
This is the fourth and final installment of our series around 2021 security planning. Through this series, we talked to...
Jumping right back to a triple digit volume of vulnerabilities resolved, Microsoft covers 112 CVEs this November affecting products ranging...
What’s up? On November 6, 2020 Microsoft’s Kevin Beaumont alerted the community to evidence of active exploitation attempts of CVE-2020-3992...