SharpMapExec – A Sharpen Version Of CrackMapExec
A sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss...
A sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss...
Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should...
Tens of Al Jazeera employees were targeted in a cyber espionage campaign leveraging a zero-click iOS zero-day vulnerability to hack...
Flavor and fragrance producer Symrise is the last victim of the Clop ransomware gang that claims to have stolen 500...
Experts uncovered a massive fraud operation that used a network of mobile device emulators to steal millions of dollars from...
The United States is witnessing major cyberattacks, multiple government departments’ agencies are being targeted including treasury and commerce departments, homeland...
Sploit is a Go package that aids in binary analysis and exploitation. The motivating factor behind the development of sploit...
Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.Options -q,...
This post includes the details of the COVID-19 themed attacks launched from December 6 – December 19, 2020. December 6...
NATO announced it is assessing its systems after the SolarWinds supply chain attack that impacted multiple US government agencies. NATO...
A number of organisations have been attacked by what has been chronicled as one of the most severe acts of...
After months of lockdown, this Christmas season has become even more special to people but fraudsters are also beginning...
Active Cypher: The company is built upon a socially responsible fabric, that provides information security for individuals and corporations...
Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process...
A bento (弁当, bentō) is a single-portion take-out or home-packed meal of Japanese origin. Bento Toolkit is a simple and...
The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks...
Joker’s Stash, the largest carding marketplace online, was shut down by a coordinated operation conducted by the FBI and the...
Threat actors continue to trade critical medical data in the Dark Web while organizations are involved in the response to the COVID-19 pandemic. Cybercrime organizations...
In part 1 of this article series, we looked at data mining schemes, scam ad campaigns, concert tickets scams, and...
VKontakte is surprised by the decision of the European Commission to include the social network in the list of resources...
Not long ago, US agencies had confirmed a massive data breach that compromised their networks. The problem persists, and US...
According to the Russian President, he is counting on the experience of the President-elect of the United States, which will...
On December 13, 2020 FireEye published important details of a newly discovered supply chain attack. An unknown attacker, referred to...
The ever-increasing role of technology in every aspect of our society has turned cybersecurity into a major sovereignty issue for...