Inside Apple: How macOS attacks are evolving
The start of fall 2021 saw the fourth Objective by the Sea (OBTS) security conference, which is the only security...
The start of fall 2021 saw the fourth Objective by the Sea (OBTS) security conference, which is the only security...
In September 2021, a publicly accessible PostgresSQL database belonging to the Playbook service was identified. Run by VC firm Plug...
Linux CatScale is a bash script that uses live of the land tools to collect extensive data from Linux based...
Microsoft Azure cloud service mitigated a massive DDoS attack of 2.4 terabytes per second (Tbps) at the end of August,...
Apple released emergency updates for both iOS and iPadOS to address a zero-day flaw that is actively exploited in the...
Ukrainian police arrested a cybercriminal who controlled a botnet composed of 100,000 devices that was available for rent to launch...
DEV-0343: Iran-linked threat actors are targeting US and Israeli defense technology companies leveraging password spraying attacks. Researchers at Microsoft Threat...
Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE...
LibreOffice and OpenOffice released security updates to address a vulnerability that can be exploited by an attacker to spoof signed...
A Togolese human rights advocate was hit by mobile spyware that has been allegedly developed by an Indian firm called...
APT28, also known as FancyBear, is at the heart of another targeted campaign. This time, it’s sniffing around users of...
A dead simple library providing the foundational logic for efficient password brute force attacks against authentication interfaces. See various Wiki...
Last week on Malwarebytes Labs Does Cybersecurity Awareness Month actually improve security?Police take a piece out of a ransomware gang,...
The NSA issued a technical advisory to warn organizations against the use of wildcard TLS certificates and the new ALPACA...
FUSE is a penetration testing system designed to identify Unrestricted Executable File Upload (UEFU) vulnerabilities. The details of the testing...
Medical device maker Medtronic recalled the remote controllers used with some of its insulin pumps because of dangerous vulnerabilities. Medical device maker...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
This tool allows you to statically analyze Windows, Linux, OSX executables and APK files.You can get:What DLL files are used.Functions...
ESET researchers spotted a previously unknown, modular Linux malware, dubbed FontOnLake, that has been employed in targeted attacks. ESET researchers...
GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by...
Google has addressed a total of four high-severity vulnerabilities in the Chrome version for Windows, Mac, and Linux. Google released...
Security expert Dhiraj Mishra published an NMAP script for the CVE-2021-41773 Path Traversal vulnerability affecting Apache Web Server version 2.4.49. Security...
CyberNews researchers found an exposed configuration file hosted on a Sky.com subdomain containing production data. Original post @ https://cybernews.com/news/sky-com-servers-exposed-via-misconfiguration/ CyberNews...
AF-ShellHunter: Auto shell lookupAF-ShellHunter its a script designed to automate the search of WebShell's in AF TeamHow topip3 install -r...