Why Most Red Teams are Really Pentesters
Something that we have seen increasingly often on Twitter recently is people ostensibly posting about “Red Teams” and how if...
Something that we have seen increasingly often on Twitter recently is people ostensibly posting about “Red Teams” and how if...
Aruba addressed multiple critical severity vulnerabilities in the EdgeConnect Enterprise Orchestrator. Aruba addressed multiple critical severity vulnerabilities in the EdgeConnect...
Microsoft Patch Tuesday security updates for October 2022 addressed a total of 85 security vulnerabilities, including an actively exploited zero-day. Microsoft...
The SteaLinG is an open-source penetration testing framework designed for social engineering After the hack, you can upload it to...
VMware has yet to address the CVE-2021-22048 privilege escalation vulnerability in vCenter Server disclosed in November 2021. VMware warns customers...
Lockbit ransomware affiliates are compromising Microsoft Exchange servers to deploy their ransomware, experts warn. South-Korean cybersecurity firm AhnLab reported that...
Researchers warn of a new phishing-as-a-service (PhaaS) toolkit, called Caffeine, which is being used by cybercriminals. In March 2022, Mandiant researchers...
Monkey365 is an Open Source security tool that can be used to easily conduct not only Microsoft 365, but also...
Threat actors behind the Emotet bot are continually improving their tactics, techniques, and procedures to avoid detection. VMware researchers have...
California-based Resecurity has identified a new spike of underground services enabling bad actors to generate deepfakes. According to cybersecurity experts,...
Toyota Motor Corporation discloses data leak, customers’ personal information may have been exposed after an access key was exposed on...
Fortinet has confirmed that the recently disclosed critical authentication bypass issue (CVE-2022-40684) is being exploited in the wild. Last week,...
The pro-Russia hacktivist group ‘KillNet’ is behind massive DDoS attacks that hit websites of several major airports in the US....
The German Interior Minister wants to dismiss the head of the Federal Cyber Security Authority (BSI), Arne Schoenbohm, due to...
The protocol aims to develop a application layer abstraction for the Hyper Service Transfer Protocol. HSTP is a recursion as...
BidenCash, a popular dark web carding site, released a dump of more than 1.2 million credit cards to promote its...
Threat actors got to a database with over 152,000 customer records before its owner, the Turkish branch of Harvard Business...
Everest ransomware operators claimed to have hacked South Africa state-owned company ESKOM Hld SOC Ltd. In March 2022, the Everest...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
CommonSpirit, one of the largest hospital chains in the US, suffered a ransomware cyberattack that impacted its operations. Common Spirit,...
EvilnoVNC is a Ready to go Phishing Platform. Unlike other phishing techniques, EvilnoVNC allows 2FA bypassing by using a real...
Lloyd’s of London launched on Wednesday an investigating into a possible cyber attack after having detected unusual activity on its...
The BlackByte ransomware operators are leveraging a flaw in a legitimate Windows driver to bypass security solutions. Researchers from Sophos...
Threat actors are exploiting an unpatched severe remote code execution vulnerability in the Zimbra collaboration platform. Researchers from Rapid7 are...