npm libraries coa and rc. have been hijacked to deliver password-stealing malware
Two popular npm libraries, coa and rc., have been hijacked, threat actors replaced them with versions laced with password-stealing malware. The security...
Two popular npm libraries, coa and rc., have been hijacked, threat actors replaced them with versions laced with password-stealing malware. The security...
The US government offers up to a $10,000,000 reward for information leading to the identification or arrest of DarkSide gang...
CISA urges vendors to address BrakTooth flaws after researchers have released public exploit code and a proof of concept tool...
Cisco fixed critical flaws that could have allowed unauthenticated attackers to access its devices with hard-coded credentials or default SSH...
androidqf (Android Quick Forensics) is a portable tool to simplify the acquisition of relevant forensic data from Android devices. It...
A critical heap-overflow vulnerability, tracked as CVE-2021-43267, in Linux Kernel can allow remote attackers to takeover vulnerable installs. A SentinelOne...
The US DoJ charged the suspected Twitter hacker ‘PlugWalkJoe’ with the theft of $784,000 worth of cryptocurrency using SIM swap attacks....
The US CISA shared a list of vulnerabilities known to be exploited in the wild and orders US federal agencies...
Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! With this tool you can...
CERT-France warns of a new ransomware group named Lockean that is behind a series of attacks against French organizations over...
The U.K. Labour Party discloses a data breach after a ransomware attack hit a service provider that is managing its...
TIWAP is a web security testing lab made using Flask for budding security enthusiasts to learn about various web vulnerabilities....
Cyber Defense Magazine September 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with 155 pages of excellent...
The U.S. sanctioned four companies for the development of surveillance malware or the sale of hacking tools used by nation-state...
This tool was implemented as part of our Brucon2021 conference talk and demonstrates the usage of cloned handles to Lsass...
Experts warn of the availability in the cybercrime underground of offers for initial access to networks of players in global...
The BlackMatter ransomware gang announced it is going to shut down its operation due to pressure from law enforcement. The...
Google’s Android November 2021 security updates address a zero-day vulnerability in the Kernel that is actively exploited in the wild....
Facebook announced to shut down its Face Recognition system and is going to delete over 1 billion people’s facial recognition...
The purpose of this module is to automate the deployment of an Active Directory lab for practicing internal penetration testing....
The FBI warns of ransomware attacks on businesses involved in “time-sensitive financial events” such as corporate mergers and acquisitions. The Federal...
Google is going to increase the bounty for finding and exploiting privilege escalation vulnerabilities in the Linux kernel. Good news...
Researchers warn of a now-fixed critical remote code execution (RCE) vulnerability in GitLab ‘s web interface actively exploited in the...
Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software...