CISA adds 95 flaws to the Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 95 vulnerabilities to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 95 vulnerabilities to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and...
Open source self-hosted HaccTheHub is an open source project that provides cyber security The HaccTheHub system consists of 3 main...
Russian government released a list containing IP addresses and domains behind DDoS attacks that hit Russian infrastructure after the invasion. While the...
This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition)...
While Russia is invading Ukraine, multiple forces are joining in the conflict, especially in the cyber space, let’s analyze them...
Avast released a decryptor for the HermeticRansom ransomware used in recent targeted attacks against Ukrainian entities. Avast has released a...
Chaya protects your privacy through steganography, Supports AES-256-GCM cryptography Supports Standard LSB steganography Supports LSB-LPS steganography Supports FLIF lossless compression...
Researchers analyzed more than 200,000 network-connected medical infusion pumps and discovered that over 100,000 of them are vulnerable. Researchers from...
Cisco fixed critical flaws in its Expressway Series and TelePresence Video Communication Server (VCS) unified communications products. Cisco announced security...
As digital transformation is advancing and automation is becoming an essential component of modern enterprises, collaboration between humans and machines...
Researchers observed a spike in the attacks against Ukrainian WordPress sites since the beginning of the military invasion of the...
Litefuzz is meant to serve a purpose: fuzz and triage on all the major platforms, support both CLI/GUI apps, network...
Russia considers it legitimate to invade another country but warns it will consider cyberattacks on its satellites an act of...
Researchers from JFrog’s Security Research team discovered five vulnerabilities in the PJSIP open-source multimedia communication library. Researchers from JFrog’s Security...
A spear-phishing campaign, tracked as Asylum Ambuscade, targets European government personnel aiding Ukrainian refugees. Researchers from cybersecurity firm Proofpoint uncovered...
1. Install git clone https://github.com/j3ers3/Searpypip install -r requirement.txt配置API及账号 ./config.pypython Searpy -h 2. Help baidu Engine --google Using google Engine --so...
Chipmaker giant Nvidia confirmed a data breach after the recently disclosed security incident, proprietary information stolen. The chipmaker giant Nvidia...
The massive operation launched by the Anonymous collective against Russia for its illegitimate invasion continues. The popular collective Anonymous, and...
CAPE is a malware sandbox. It was derived from Cuckoo with the goal of adding automated malware unpacking and config...
A Ukrainian researcher leaked the source for the Conti ransomware and components for the control panels. Recently a Ukrainian researcher leaked...
IsaacWiper, a new data wiper was used against an unnamed Ukrainian government network after Russia’s invasion of Ukraine. ESET researchers...
BruteShark is a Network Building a Network Diagram File Carving Password Extracting Reconstruct all TCP Sessions Extract VoIP Calls ...
Daxin is the most advanced backdoor in the arsenal of China-linked threat actors designed to avoid the detection of sophisticated...
Checkov is a Getting started Requirements Python >= 3.7 (Data classes are available for Python 3.7+) Terraform >= 0.12 Installation...