Sierra Wireless halted production at its manufacturing sites due to ransomware attack
This week, IoT company Sierra Wireless disclosed a ransomware attack that hit its internal IT systems on March 20 and...
This week, IoT company Sierra Wireless disclosed a ransomware attack that hit its internal IT systems on March 20 and...
A library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but...
A golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a...
This blog post is part of an ongoing series about evaluating Managed Detection and Response (MDR) providers. For more insights,...
In recent weeks, there has been quite a lot of reporting on the exploitation of the latest disclosed vulnerabilities in...
Google addressed a zero-day vulnerability affecting Android devices that use Qualcomm chipsets which is actively exploited in the wild. Google...
U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns of flaws in GE Power Management Devices that could allow an attacker...
Oil and gas giant Royal Dutch Shell (Shell) discloses a data breach resulting from the compromise of its Accellion File...
The Ministry of Defence academy was hit by a major cyber attack, Russia and China state-sponsored hackers are suspected to...
Adobe has released security updates to address a critical vulnerability in the ColdFusion product (versions 2021, 2016, and 2018) that could lead...
Experts uncovered critical flaws in the Netop Vision Pro distance learning software used by many schools to control remote learning...
PoC Exploit for Microsoft Exchange Launche Original PoC: https://github.com/testanullHow to use:python proxylogon.py <name or IP of server> <user@fqdn> Example:python proxylogon.py...
Fast browser-based network discovery module Descriptionnetmap.js provides browser-based host discovery and port scanning capabilities to allow you to map website...
You probably already know that SOC automation with InsightIDR and InsightConnect can decrease your #MeanTimeToResponse. It may not be a...
The Apache Software Foundation fixed a high severity remote code execution flaw in Apache OFBiz that could have allowed attackers...
The Kaspersky ICS CERT published a report that provided details about the threat landscape for computers in the ICS engineering...
An automated web hacking framework for web applications Detailed insight about Vajra can be found athttps://hackwithproxy.medium.com/introducing-vajra-an-advanced-web-hacking-framework-bd8307a01aa8 About Vajra Vajra is an...
Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs. SetupStep 1: Install Python...
A framework for identifying and exploiting out-of-band (OOB) vulnerabilities. Installation & SetupMole InstallPython >= 3.6 virtualenv -p /usr/bin/python3 venv source...
US CISA has released a new tool that allows detecting malicious activity associated with the SolarWinds hackers in compromised on-premises...
Department of Justice announced that Swiss hacker Till Kottmann, 21, has been indicted for conspiracy, wire fraud, and aggravated identity...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Microsoft announced that its Defender Antivirus and System Center Endpoint Protection now protects users against attacks exploiting Exchange Server vulnerabilities....
A hacking group has employed at least 11 zero-day flaws as part of an operation that took place in 2020...