Pwn2Own 2021, more than $1,500,000 in cash and prizes for contestants
Trend Micro’s Zero Day Initiative announced the Pwn2Own Vancouver 2021 hacking competition that will also cover Zoom, MS Teams Exploits....
Trend Micro’s Zero Day Initiative announced the Pwn2Own Vancouver 2021 hacking competition that will also cover Zoom, MS Teams Exploits....
New and improved C# Implementation of Invoke-EDRChecker. Checks running processes, process metadata, Dlls loaded into your current process and each...
emba is being developed as a firmware scanner that analyses already-extracted Linux-based firmware images. It should help you to identify...
Web applications have been growing in complexity over the past several years, while also becoming the preferred method for attackers...
Let’s talk about cyber risk in the maritime and port setting to better understand Maritime Port cybersecurity. In order to...
Apple has addressed three zero-day vulnerabilities in its iOS operating system that have been exploited in the wild. Apple has...
CVE-2021-3156 Sudo vulnerability has allowed any local user to gain root privileges on Unix-like operating systems without authentication. Sudo is one...
Security vendors Fidelis, Mimecast, Palo Alto Networks, and Qualys revealed that were also impacted by SolarWinds supply chain attack The...
Threat Report Portugal Q4 2020: Data related to Phishing and malware attacks based on the Portuguese Abuse Open Feed 0xSI_f33d. The...
Last week we announced a new partnership with Kali for Starkiller and Empire. You can read up more about that...
Batea is a context-driven network device ranking framework based on the anomaly detection family of machine learning algorithms. The goal...
Disk Usage/Free Utility (Linux, BSD, macOS & Windows) FeaturesUser-friendly, colorful output Adjusts to your terminal's width Sort the results according...
This blog was co-authored by Caitlin Condon, VRM Security Research Manager, and Bob Rudis, Senior Director and Chief Security Data...
A vulnerability in the video-sharing social networking service TikTok could have allowed hackers to steal users’ private personal information. Developers at ByteDance,...
Google TAG is warning that North Korea-linked hackers targeting security researchers through social media. Google Threat Analysis Group (TAG) is...
Dutch police arrested two individuals for allegedly selling COVID-19 patient data stolen from the Dutch health ministry. Dutch police have...
Packaging giant WestRock disclosed a ransomware attack that impacted its information technology (IT) and operational technology (OT) systems. American corrugated packaging company...
Zscaler’s research team recently spotted a Linux-based malware family, tracked as DreamBus botnet, targeting Linux servers. Researchers at Zscaler’s ThreatLabZ...
C-shellcode to hex converter. Handy tool for paste & execute shellcodes in gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger &...
One of the major struggles in bug bounty hunting is to collect and analyze data during reconnaissance, especially when there...
As vice president and head of global security at ActiveCampaign, I’m fortunate to be able to draw on a multitude...
Indian cryptocurrency exchange Buyucoin suffered a security incident, threat actors leaked sensitive data of 325K users. A new incident involving...
Tesla has accused a former employee, a software engineer, of downloading about 26,000 sensitive files and transferring them on his...
A well-known threat actor has leaked data belonging to 2.28 million users registered on the dating website MeetMindful. ZDNet first reported...