Google addresses a high severity flaw in V8 engine in Chrome
Google released updates for Chrome 90 that address a new serious issue, tracked as CVE-2021-21227, in the V8 JavaScript engine...
Google released updates for Chrome 90 that address a new serious issue, tracked as CVE-2021-21227, in the V8 JavaScript engine...
UK rail network Merseyrail was hit by a cyberattack, ransomware operators breached the corporate email system to disclose the attack...
Misconfigured cloud-based databases continue to cause data breaches, millions of database servers are currently exposed across cloud providers. Fugue’s new State...
The FBI has shared with Have I Been Pwned service 4 million email addresses collected by Emotet botnet and employed...
Lookups for real IP starting from the favicon icon and using Shodan.Installationpip3 install -r requirements.txt Shodan API key (not the...
Offline search tool for LDAP directory dumps in LDIF format. FeaturesFast and memory efficient parsing of LDIF files Build ldapsearch...
CISA and NIST published a report on software supply chain attacks that shed light on the associated risks and provide...
Officials revealed that the school district near Albany was hit by a ransomware attack that forced students in grades 7...
Microsoft announced an improvement of its Defender antivirus that will leverage Intel’s Threat Detection Technology (TDT) to detect processes associated...
Apple addresses a zero-day in macOS exploited by Shlayer malware to bypass Apple’s security features and deliver second-stage malicious payloads. Apple...
Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information. Boffins from the...
Easily create permutations and combinations of words with predefined sets of extensions, words and patterns/function. You can use this tool...
Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well...
European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows...
Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts...
The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another...
Introducing TScopyIt is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the...
Posta is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit postMessage vulnerabilities, and...
Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
10,000+ unpatched ABUS Secvest home alarm systems could be remotely disabled exposing customers to intrusions and thefts. Researchers from Eye Security have...
The cybersecurity community has lost its star, the popular hacker Dan Kaminsky has passed away. The popular cyber security researcher...
ToxicEye is a new Remote Access Trojan (RAT) that exploits the Telegram service as part of it command and control...
Explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you will find: flag...