Spam and phishing in Q2 2020
Quarterly highlights Targeted attacks The second quarter often saw phishers resort to targeted attacks, especially against fairly small companies. To...
Quarterly highlights Targeted attacks The second quarter often saw phishers resort to targeted attacks, especially against fairly small companies. To...
FestIn is a tool for discovering open S3 Buckets starting from a domains.It perform a lot of test and collects...
Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.Main FeaturesWrite your own PayloadsIn-Memory executionExtract Password ListDashboard...
This blog post is part 2 of a two-part blog series recapping Rapid7’s Black Hat debriefs as part of Virtual...
Face recognition AI is increasingly being used at Airports and at other security outlets, especially during a pandemic to heed...
It is noted that hackers use streaming platforms, TV series and movies to distribute advertising and malware. They can add...
Alexander Vurasko, a leading Infosecurity analyst at Softline Company, said that during the pandemic, scammers learned how to qualitatively fake...
As we continue to track web threats and credit card skimming in particular, we often rediscover techniques we’ve encountered elsewhere...
In June 2020, the online exam service ProctorU suffered a data breach which was subsequently shared extensively across online...
Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility...
Introduction I've been tracking malicious Word documents from the TA551 (Shathak) campaign This year, we've seen a lot of Valak...
Yesterday, I found a new malicious Powershell script that deserved to be analyzed due to the way it was dropped...
A TCP tunneling suite built with golang and gRPC. gTunnel can manage multiple forward and reverse tunnels that are all...
TaoWu(檮杌) is a CobaltStrike toolkit. All the scripts are gathered on the Internet and slightly modified by myself. You can...
Boy, oh boy, has Black Hat changed. Where we once looked up at the neon lights of Las Vegas, we...
Today the Metasploit team is pleased to announce active development of Metasploit Framework 6.0, available now for testing and community...
In the United States, data privacy is hard work—particularly for the American people. But one US Senator believes it shouldn’t...
The evergreen peril of business email compromise (BEC) finds itself in the news once more. This time, major English Premier...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
As TikTok fell prey to extensive criticism and was labeled as a 'threat to security' by governments, resulting in the...
More than a third of all cases of leaks of personal data of patients with coronavirus, as well as suspected...
WastedLocker has been in the highlights for a successful attack on wearable tech and smartwatch manufacturer Garmin and was paid...
A tool for UEFI firmware reverse engineering.UEFI firmware analysis with uefi_retool.py scriptUsage:Copy ida_plugin/uefi_analyser.py script and ida_plugin/uefi_analyser directory to IDA plugins...
Network reconnaisance tool that sniffs for active hostsIntroductionNetenum passively monitors the ARP traffic on the network. It extracts basic data...