Threat actors can remotely disable Fortress S03 Wi-Fi Home Security System
Rapid7 researchers discovered two flaws that can be exploited by attackers to remotely disable one of the home security systems...
Rapid7 researchers discovered two flaws that can be exploited by attackers to remotely disable one of the home security systems...
fpicker is a Frida-based fuzzing suite that offers a variety of fuzzing modes for in-process fuzzing, such as an AFL++...
KeyHacks shows ways in which particular API keys found on a Bug Bounty Program can be used, to check if...
Hewlett Packard Enterprise (HPE) warns of a vulnerability in Sudo open-source program used in its Aruba AirWave management platform. Hewlett Packard...
Crooks have stolen more than $19 million in cryptocurrency assets from Cream Finance, a decentralized finance (DeFi) platform. Threat actors...
ProxyToken is a serious vulnerability in Microsoft Exchange Server that could allow unauthentication attackers to access emails from a target...
Reg1c1de is a tool that scans specified registry hives and reports on any keys where the user has write permissions...
Speakeasy is a portable, modular, binary emulator designed to emulate Windows kernel and user mode malware. Check out the overview...
The US DoJ announced a new Cyber Fellowship program for training prosecutors and attorneys on cybersecurity. The US DoJ announced...
Who is behind the massive and prolonged Distributed Denial of Service (DDoS) attack that hit the Philippine human rights alliance Karapatan?...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert urging enterprises to address the recently disclosed vulnerability in...
The Boston Public Library was victim of a cyberattack that crippled its computer network, the library revealed in a statement...
So far, Konni RAT has managed to evade detection as only 3 security solutions on VirusTotal were able to detect...
Read the blog posts here: https://iwantmore.pizza/posts/PEzor.html https://iwantmore.pizza/posts/PEzor2.html https://iwantmore.pizza/posts/PEzor3.html https://iwantmore.pizza/posts/PEzor4.html InstallationThe install.sh is designed to work on a Kali Linux distro....
M.E.A.T. - Mobile Evidence Acquisition ToolkitMeet M.E.A.T! From Jack Farley - BlackStone Discovery This toolkit aims to help forensicators perform...
The name of the sportswear manufacturer Puma appeared on the dark web marketplace of stolen data Marketo, threat actors claim...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The Philippine human rights alliance Karapatan has suffered a massive and prolonged Distributed Denial of Service (DDoS) attack, Qurium organizations linked it...
Taiwan vendor Synology announced that recently disclosed vulnerabilities (CVE-2021-3711 and CVE-2021-3712) in the OpenSSL impact some of its products. Taiwanese company Synology...
vpnMentor’s researchers reported that the Chinese mobile gaming company EskyFun suffered a data breach, over 1 million gamers impacted. vpnMentor’s researchers discovered...
Boffins from the Swiss ETH Zurich university demonstrated PIN bypass attack on contactless cards from Mastercard and Maestro. A group...
Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It...
gargantuan hashcat rulesets generated from compromised passwords Project maintenance warning: This project is deemed completed. No pull requests or changes...
Crooks behind the Phorpiex botnet have shut down their operations and put the source code for sale on the dark...