Exploitability Analysis: Smash the Ref Bug Class
In April 2020, security researcher Gil Dabah published a paper on a set of vulnerabilities he had discovered within the...
In April 2020, security researcher Gil Dabah published a paper on a set of vulnerabilities he had discovered within the...
Sometimes, I think there are three certainties in life: death, taxes, and some form of payment fraud. Security reporter Danny...
For most of our accounts be it Bank accounts or social media accounts, we rely on two-factor authentication and OTP...
On 3rd of September, we were hosting our “Experts Talk. Why master YARA: from routine to extreme threat hunting cases“,...
A multiprocessing approach to auditing Active Directory passwords using Python. About Lil PwnyLil Pwny is a Python application to perform...
Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware...
Today's topic is Exchange 2010, which reaches end of support (EoS) on Oct. 13, 2020, as well as a survey...
In this four-part series, we’ll explore key considerations and strategies for 2021 detection and response planning, and ways InsightIDR, Managed...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Spying malware "FinSpy" has come back again in Egypt. This time in new campaigns is attacking activists and protestor organizations....
In a rather coordinated attempt in order to steal strategic data and critical infrastructure by sending phishing mails a...
Being cybersecurity ready offers many advantages, but your organization can always target hackers unless you do not know critical details....
NERVE is a vulnerability scanner tailored to find low-hanging fruit level vulnerabilities, in specific application configurations, network services, and unpatched...
Cooolis-ms is a server that supports Metasploit Framework RPC. It is used to work for Shellcode and PE loader, bypassing...
The official website of the Ministry of Internal Affairs of Belarus, which has not worked for 19 days, is again...
Social networking giant Facebook says it terminated three fake account networks that could have been working for Russian intelligence. The...
The source code for Windows XP SP1 was leaked online today as a torrent. The person behind the leak claims...
LokiBot, a trojan-type malware first identified in 2015 is popular amid cybercriminals as a means of creating a backdoor into...
PwnedPasswordsChecker is a tool that checks if the hash of a known password (in SHA1 or NTLM format) is present...
A set of scripts to help perform an online dictionary attack against a WPA3 access point. Wacker leverages the wpa_supplicant...
The Ministry of Digital Development of Russia wants to ban the use of experimental encryption protocols DNS over TLS, DNS...
While Q2 of this year saw an overall 8% decrease in malware attacks, 70% of them were zero-day attack (attacks...
.Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py. By default runs in the context...
Velociraptor is a tool for collecting host based state information using Velocidex Query Language (VQL) queries. To learn more about...