PKINITtools – Tools For Kerberos PKINIT And Relaying To AD CS
This repository contains some utilities for playing with PKINIT and certificates. The tools are built on minikerberos and impacket. Accompanying...
This repository contains some utilities for playing with PKINIT and certificates. The tools are built on minikerberos and impacket. Accompanying...
Security researchers devised a new attack method against iPhone owners using Apple Pay and Visa payment cards. Boffins from the...
14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties Original post @...
SharpML is a proof of concept file share data mining tool using Machine Learning in Python and C#. The tool...
Researchers at Zimperium have discovered an aggressive mobile premium services campaign with over 10 million victims all over the world....
Two-factor authentication is a great way to protect your online accounts, and we always recommend you turn it on. But...
Cybersecurity experts have discovered a new hacker group ChamelGang, which attacks institutions in ten countries around the world, including Russia....
Internet scammers are using Twitter bots to trick users into making PayPal and Venmo payments to accounts under their possession....
Within the last couple of days, Bandwidth.com has been the latest target of distributed denial of service attacks targeting VoIP...
Researchers from Microsoft Threat Intelligence Center (MSTIC) identified FoggyWeb, a new custom malware utilized by the Nobelium APT group to...
Just as the US was completing its withdrawal from Afghanistan, several China-linked cyberespionage groups were seen intensifying attacks on a...
Threat actors are actively exploiting the recently disclosed CVE-2021-26084 RCE vulnerability in Atlassian Confluence deployments. Trend Micro researchers have spotted...
The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider...
Facebook released Mariana Trench, an internal open-source tool that can be used to identify vulnerabilities in Android and Java applications....
The security researcher Jose Rodriguez discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet...
Summary: An elevation of privilege vulnerability exists in Visual Studio and Visual Studio Code when they load software dependencies, aka...
Summary: An elevation of privilege vulnerability exists in Visual Studio and Visual Studio Code when they load software dependencies, aka...
Summary: The vCenter Server contains a denial-of-service vulnerability in VAPI (vCenter API) service. A malicious actor with network access to...
Summary: A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain...
Summary: WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that...
Summary: A CSRF in Concrete CMS version 8.5.5 and below allows an attacker to duplicate files which can lead to...
Security and privacy advocates may have cause to worry after all: Portpass, a vaccine passport app in Canada, has been...
Microsoft offers to help you with patching Exchange servers, CISA offers an insider threat tool, and together with the NSA...
Instagram has announced it is pausing the development of its newest brainchild, Instagram Kids—a version of Instagram aimed at 10-12-year-olds,...