FireEye releases an auditing tool to detect SolarWinds hackers’ activity
Cybersecurity firm FireEye has released a report that sheds the light on the SolarWinds attack and the way hackers breached...
Cybersecurity firm FireEye has released a report that sheds the light on the SolarWinds attack and the way hackers breached...
Cyber security firm Malwarebytes announced that threat actor behind the SolarWinds attack also breached its network last year. Malwarebytes revealed...
The threat actors behind the SolarWinds attack used malware dubbed Raindrop for lateral movement and deploying additional payloads. Security experts...
Background In November, Kali announced a new program for supporting tool developers, which kicked off with sponsoring Byt3Bl33d3r. We are...
A tool to hunt for credentials in the GitHub wild AKA git*huntGetting startedInstall the tool Configure your GitHub token Search...
HosTaGe is a lightweight, low-interaction, portable, and generic honeypot for mobile devices that aims on the detection of malicious, wireless...
LEQL Multi-groupby in InsightIDRFor a look at the most up-to-date list of Log Search capabilities, check out our help documentation...
Security researchers uncovered a series of attacks conducted by the FreakOut botnet that leveraged recently discovered vulnerabilities. Security researchers from...
The Federal Bureau of Investigation (FBI) has issued a notification warning of ongoing vishing attacks attempting to steal corporate accounts. The...
The OpenWRT forum, the community behind the open-source project for embedded operating systems based on Linux, disclosed a data breach....
Experts from Cyble recently found a leak of 500K+ records of C-level people from Capital Economics on a Russian-speaking forum. During a routine Darkweb monitoring, researchers...
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial...
Collect OSINT for GitLab groups and members and search the group and group members' snippets, issues, and issue discussions for...
A duo of white hat hackers claims to have earned $50,000 from Apple for reporting serious flaws that allowed them...
The U.S. National Security Agency has appointed Rob Joyce as the agency’s new director of cybersecurity, who has long experience...
German data regulator LfD announced a €10.4M fine under GDPR against the online laptop and electronic goods retailer NBB for...
President Joe Biden can’t bring his Peloton exercise equipment to the White House due to security reasons. According to a...
The European Medicines Agency (EMA) revealed Friday that COVID-19 vaccine documents stolen from its servers have been manipulated before the...
A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM. FeaturesFeatureful...
This cli is for pentesters, CTF players, or dev. You can modify your jwt, sign, inject ,etc... Check Documentation for...
Two vulnerabilities in the Orbit Fox WordPress plugin, a privilege-escalation issue and a stored XSS bug, can allow site takeover....
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The development team behind the Linux Mint distro has fixed a security flaw that could have allowed users to bypass...
SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are...