Cybersecurity Vulnerability Disclosure in Trade Agreements
Cybersecurity has now become a feature of modernized US trade agreements, with new cybersecurity provisions in the US-Mexico-Canada Agreement and...
Cybersecurity has now become a feature of modernized US trade agreements, with new cybersecurity provisions in the US-Mexico-Canada Agreement and...
On this week’s episode of Security Nation, we had the pleasure of speaking with Alex Kreilein, CISO for RapidDeploy, a...
The FBI’s Internet Crime Complaint Center (IC3) has issued a public service announcement warning citizens to watch out for email-based...
Scammers and malware authors are taking advantage of the coronavirus crisis in full swing. We have seen a number of...
Last week on Malwarebytes Labs, we concluded our series on child identity theft. We also looked into threat actors and...
In 2019, the Rostelecom Solar JSOC Monitoring and Response Center for Cyberthreats detected and repelled over 1.1 million external attacks...
In order to ruin the users' stay at home during their work from home period brought about by COVID-19, the...
Canada's hospitals and clinics are suffering massive cyber threats as the cyberattacks targeting the Canadian healthcare industry saw a sudden...
Starkiller is a Frontend for Powershell Empire. It is an Electron application written in VueJS. If you'd like to contribute...
FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new...
Not of late, LILIN recorders were found to be vulnerable. Reportedly, botnet operators were behind the zero-day vulnerabilities that were...
Scoring Engine for Red/White/Blue Team CompetitionsGetting startedDownload Docker. If you are on Mac or Windows, Docker Compose will be automatically...
REST API penetration testing is complex due to continuous changes in existing APIs and newly added APIs. Astra can be...
Dubbed as CrazyCoin, a brand new virus has been recently discovered by researchers, which spreads through the NSA leaked EternalBlue...
A browser extension that encrypts your communications with many websites that offer HTTPS but still allow unencrypted connections.Getting StartedGet the...
uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or...
In an effort to make malware appear legitimate and help it sneak past security software, groups using two well-known trojans...
Coronavirus has changed the face of the world, restricting countless individuals from dining at restaurants, working from cafes, and visiting...
Hacker group Digital Revolution published documents according to which the FSB ordered the creation of the Fronton program for organizing...
Russian payment systems will switch to using domestic cryptographic information security tools by 2031Existing payment systems in Russia will have...
Pwn2Own is a well-known computer hacking contest which is held once every year at the CanSecWest security conference. In this...
I wrote this tool to help me testing XXE vulnerabilities.It generates the XML payloads, and automatically starts a server to...
OWASP Maryam is an Open-source intelligence(OSINT) and Web-based Footprinting modular/tool framework based on the Recon-ng and written in Python. If...
Malicious actors have created a new module for the TrickBot banking trojan that allows the malware to perform brute force...