HyperDbg – The Source Code Of HyperDbg Debugger
HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world....
HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world....
BinwalkWhen mucking about with firmware (the packaged operating system and applications that makes IoT devices go), Binwalk from Refirm Labs...
Not to start off another blog post about how insane this year has been, but let’s just take a moment...
Below the list of the top stories of 2020. December 21 – SUPERNOVA, a backdoor found while investigating SolarWinds hack...
The Federal Bureau Investigation (FBI) is warning owners of smart home devices with voice and video capabilities of ‘swatting’ attacks....
A large scale ad phishing campaign that has compromised more than 6.15 lakh Facebook users' account was exposed by cybersecurity...
The parliament of Finland verified on Monday that some hackers had procured entry into the internal IT system of Finland...
GenRx Pharmacy, which is settled in Scottsdale, AZ, is telling people of a data breach incident. The occurrence might affect...
Experts spotted a new credential stealer written in AutoHotkey (AHK) scripting language that is targeting the US and Canadian bank...
Cybercriminals are abusing Facebook ads in a large-scale phishing scam aimed at stealing victims’ login credentials. Researchers from security firm...
Zyxel addressed a critical flaw in its firmware, tracked as CVE-2020-29583, related to the presence of a hardcoded undocumented secret account....
Summary: CVE-2020-0688 is a memory corruption vulnerability impacting Microsoft Exchange. A Metasploit module was observed in open source and subsequently...
Summary: CVE-2020-14871 is an unspecified vulnerability impacting Oracle Solaris versions 10 and 11. A Metasploit module was observed in open...
Summary: CVE-2019-12840 is an OS command injection vulnerability impacting Webmin versions 1.910 and earlier. A Metasploit module was observed in...
Summary: CVE-2020-0688 is a memory corruption vulnerability impacting Microsoft Exchange. A Metasploit module was observed in open source and subsequently...
Summary: CVE-2020-14871 is an unspecified vulnerability impacting Oracle Solaris versions 10 and 11. A Metasploit module was observed in open...
Summary: CVE-2019-12840 is an OS command injection vulnerability impacting Webmin versions 1.910 and earlier. A Metasploit module was observed in...
Microsoft believes that hackers who previously attacked US government departments and businesses have gained access to internal information about its...
A decade has come to an end but the security vulnerabilities of this decade in the IT sectors cannot be...
While Microsoft is investigating the major SolarWinds cyberattack, according to the company, it found that Microsoft's systems were hacked "beyond...
Algemeen Medisch Laboratorium bvba, (AML) in the Antwerp district of Hoboken was attacked by hackers; the laboratory manages about 3,000...
The FBI gave an admonition on Tuesday telling Americans of an "expansion" of swatting assaults focusing on individuals with smart...
Oblivion is a tool focused in real time monitoring of new data leaks, notifying if the credentials of the user...
RogueWinRM is a local privilege escalation exploit that allows to escalate from a Service account (with SeImpersonatePrivilege) to Local System...