Zero-day exploit used to hack iPhones of Al Jazeera employees
Tens of Al Jazeera employees were targeted in a cyber espionage campaign leveraging a zero-click iOS zero-day vulnerability to hack...
Tens of Al Jazeera employees were targeted in a cyber espionage campaign leveraging a zero-click iOS zero-day vulnerability to hack...
Flavor and fragrance producer Symrise is the last victim of the Clop ransomware gang that claims to have stolen 500...
Experts uncovered a massive fraud operation that used a network of mobile device emulators to steal millions of dollars from...
Sploit is a Go package that aids in binary analysis and exploitation. The motivating factor behind the development of sploit...
Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.Options -q,...
This post includes the details of the COVID-19 themed attacks launched from December 6 – December 19, 2020. December 6...
NATO announced it is assessing its systems after the SolarWinds supply chain attack that impacted multiple US government agencies. NATO...
Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process...
A bento (弁当, bentō) is a single-portion take-out or home-packed meal of Japanese origin. Bento Toolkit is a simple and...
The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks...
Joker’s Stash, the largest carding marketplace online, was shut down by a coordinated operation conducted by the FBI and the...
Threat actors continue to trade critical medical data in the Dark Web while organizations are involved in the response to the COVID-19 pandemic. Cybercrime organizations...
Information Gathering Tool - Dns/Subdomain/Port EnumerationInstallationFirst of all, clone the repo locally git clone https://github.com/edoardottt/scilla.git Scilla has external dependencies, so...
Go365 is a tool designed to perform user enumeration* and password guessing attacks on organizations that use Office365 (now/soon Microsoft365)....
An enhanced version of the old all-source intelligence discipline could serve the purpose. By Boris Giannetto Hybrid, interconnected and complex...
Microsoft confirms that it was also breached in the SolarWinds supply chain hack, but excluded that the attack impacted its...
A threat actor is spreading ransomware dubbed CoderWare that masquerades as Windows and Android versions of the recent Cyberpunk 2077....
The development team behind the Contact Form 7 WordPress plugin discloses an unrestricted file upload vulnerability. Jinson Varghese Behanan from Astra Security discovered...
FBI says DoppelPaymer ransomware gang is harassing victims who refuse to pay, threatening to send individuals to their homes. FBI...
E9Patch is a powerful static binary rewriting tool for x86_64 Linux ELF binaries. E9Patch is: Scalable: E9Patch can reliably rewrite...
PoshBot is a chat bot written in PowerShell. It makes extensive use of classes introduced in PowerShell 5.0. PowerShell modules...
Are you tired of being the cybersecurity help desk for everyone you know? Are you frustrated with spending all your...
Since the launch of InsightVM’s Custom Policy Builder in June of this year, hundreds of organizations have created and customized...
Avast researchers reported that three million users installed 28 malicious Chrome or Edge extensions that could perform several malicious operations....