Security Affairs newsletter Round 280
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
WhatsApp addressed six previously undisclosed flaws in its app and disclosed them on a new dedicated security advisory site. WhatsApp announced...
The US Federal Communications Commission (FCC) estimates the cost of a full replacement of all Huawei and ZTE hardware on...
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and...
Script that allows the easy creation of OpenVPN endpoints in any AWS region. To create a VPN endpoint is done...
Create a VPS on Google Cloud Platform or Digital Ocean easily with the docker for pentest included to launch the...
hardcodes is a utility for searching strings hardcoded by developers in programs. It uses a modular tokenizer that can handle...
wordlist_generator generates wordlists with unique words with techniques mentioned in tomnomnom's report "Who, What, Where, When". It takes URLs from...
There are better ways than managing vulnerabilities with spreadsheets, especially when you are working with several tools. We know it’s...
In August, Malwarebytes Labs analyzed the damage caused by COVID-19 to business cybersecurity. Because of immediate, mandated transitions to working...
The Social Messaging app WhatsApp has been open about its bugs and vulnerabilities recently. To be vocal about the issue,...
This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as universities and classrooms around...
h4rpy is an automated WPA/WPA2 PSK attack tool, wrapper of aircrack-ng framework.h4rpy provides clean interface for automated cracking of WPA/WPA2...
SNIcat is a proof of concept tool that performs data exfiltration, utilizing a covert channel method via. Server Name Indication,...
PCI DSS is short for Payment Card Industry Data Security Standard. Every party involved in accepting credit card payments is...
Associate Professor of computer science at the Russian University of Economics, Alexander Timofeev said that hackers can use Bluetooth to...
Stortinget, the Norwegian Parliament succumbed to a cyber-attack that targeted its internal email system. The news came in on Tuesday...
Emotet malware has been continually evolving to the levels of technically sophisticated malware that has a major role in the...
IT threat evolution Q2 2020. ReviewIT threat evolution Q2 2020. PC statistics These statistics are based on detection verdicts of...
IT threat evolution Q2 2020. ReviewIT threat evolution Q2 2020. Mobile statistics These statistics are based on detection verdicts of...
IT threat evolution Q2 2020. PC statisticsIT threat evolution Q2 2020. Mobile statistics Targeted attacks PhantomLance: hiding in plain sight...
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.SetupThis tool is compactible...
Bug Bounty Recon (bbrecon) is a free Recon-as-a-Service for bug bounty hunters and security researchers. The API aims to provide...
With the pandemic still in full swing, educational institutions across the US are kicking off the 2020–2021 school year in...