DuplicateDump – Dumping LSASS With A Duplicated Handle From Custom LSA Plugin
DuplicateDump is a fork of MirrorDump with following modifications: DInovke implementation LSA plugin DLL written in C++ which could be...
DuplicateDump is a fork of MirrorDump with following modifications: DInovke implementation LSA plugin DLL written in C++ which could be...
KubeClarity is a tool for detection and management of Software Bill Of Materials (SBOM) and Features Dashboard Fixable vulnerabilities per...
Microsoft Patch Tuesday security updates for May 2022 address three zero-day vulnerabilities, one of them actively exploited. Microsoft Patch Tuesday...
The European Union condemns the cyberattacks conducted by Russia against Ukraine, which targeted the satellite KA-SAT network. The European Union...
Description of the vulnerability: https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html Construction of the POC: https://github.com/BobTheShoplifter/Spring4Shell-POC Steps to Build/Run Tested with JDK 11.0.14, Spring Boot 2.6.5,...
Microsoft disclosed a now-fixed vulnerability in Azure Synapse and Azure Data Factory that could have allowed remote code execution. Microsoft...
Run the exploit.py script: python exploit.py --url "http://localhost:8080/helloworld/greeting" Visit the created webshell! Modify the cmd GET parameter for your commands....
Hacktivists yesterday defaced the Russian TV with pro-Ukraine messages and took down the RuTube video streaming site. Hacktivists and white...
Threat actors are exploiting critical F5 BIG-IP flaw CVE-2022-1388 to deliver malicious code, cybersecurity researchers warn. Threat actors started massively exploiting...
The Resecurity HUNTER unit identified a new underground service called ‘Frappo’, which is available on the Dark Web. “Frappo” acts...
What is it? AutoResponder is a tool aimed to help people to carry out their Incident Response tasks WITH the...
Researchers warn of a remote access trojan called DCRat (aka DarkCrystal RAT) that is available for sale on Russian cybercrime...
The Computer Emergency Response Team of Ukraine (CERT-UA) warns of attacks spreading info-stealing malware Jester Stealer. The Computer Emergency Response...
A few days after F5 addressed the critical CVE-2022-1388 Remote Code execution flaw in its BIG-IP products, researchers created exploits...
China-linked Mustang Panda APT group targets entities in Asia, the European Union, Russia, and the US in a new wave of...
Conti Ransomware gang claims to have hacked the Peru MOF – Dirección General de Inteligencia (DIGIMIN) and stolen 9.41 GB....
This post provides a timeline of the events related to Russia invasion of Ukraine from the cyber security perspective. Below...
The National Institute of Standards and Technology (NIST) has released updated guidance for defending against supply-chain attacks. The National Institute...
If you want to change these URLs to your desired ones, you can simply open the cve.ps1 file with an...
The American agricultural machinery manufacturer AGCO announced that has suffered a ransomware attack that impacted its production facilities. AGCO, one of the...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The US Government offers up to $15 million for information that helps identify and locate leadership and co-conspirators of the...
A Swiss Army Knife for Zsh - Unix Shell.RoadmapSee the open issues for a list of proposed features (and known...
Researchers discovered a new Windows malware, dubbed Raspberry Robin, with worm-like capabilities that spreads via removable USB devices. Cybersecurity researchers...