Donot Team targets a Togo prominent activist with Indian-made spyware
A Togolese human rights advocate was hit by mobile spyware that has been allegedly developed by an Indian firm called...
A Togolese human rights advocate was hit by mobile spyware that has been allegedly developed by an Indian firm called...
A dead simple library providing the foundational logic for efficient password brute force attacks against authentication interfaces. See various Wiki...
The NSA issued a technical advisory to warn organizations against the use of wildcard TLS certificates and the new ALPACA...
FUSE is a penetration testing system designed to identify Unrestricted Executable File Upload (UEFU) vulnerabilities. The details of the testing...
Medical device maker Medtronic recalled the remote controllers used with some of its insulin pumps because of dangerous vulnerabilities. Medical device maker...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
This tool allows you to statically analyze Windows, Linux, OSX executables and APK files.You can get:What DLL files are used.Functions...
ESET researchers spotted a previously unknown, modular Linux malware, dubbed FontOnLake, that has been employed in targeted attacks. ESET researchers...
GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by...
Google has addressed a total of four high-severity vulnerabilities in the Chrome version for Windows, Mac, and Linux. Google released...
Security expert Dhiraj Mishra published an NMAP script for the CVE-2021-41773 Path Traversal vulnerability affecting Apache Web Server version 2.4.49. Security...
CyberNews researchers found an exposed configuration file hosted on a Sky.com subdomain containing production data. Original post @ https://cybernews.com/news/sky-com-servers-exposed-via-misconfiguration/ CyberNews...
AF-ShellHunter: Auto shell lookupAF-ShellHunter its a script designed to automate the search of WebShell's in AF TeamHow topip3 install -r...
American media conglomerate Cox Media Group (CMG) was hit by a ransomware attack that took down live TV and radio...
It’s that time of year again! This means it’s the season for Halloween, Oktoberfest, and HACKTOBERFEST! So what is Hacktoberfest?...
Microsoft revealed that Russia-linked cyberespionage groups are behind the majority of the nation-state cyber attacks on US government agencies. Microsoft...
Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process...
The Dutch government will not tolerate ransomware attacks that could threaten national security, it will use intelligence or military services...
A program to control systems remotely by uploading videos to Youtube using Python to create the videos and the listener,...
Google warned more than 14,000 Gmail users that they have been the target of nation-state spear-phishing campaigns. On Wednesday, Google...
Apache Software Foundation has released HTTP Web Server 2.4.51 to completely address a vulnerability that has been actively exploited in...
Researchers detailed the activities of the FIN12 ransomware group that earned million of dollars over the past years. Researchers from...
ASF aims to protect organizations acting as an attack surface watchdog, provided an “Object” which might be a: Domain, IP...
A proof of concept exploit for two authentication bypass vulnerabilities in Dahua cameras is available online, users are recommended to...