Fake COVID-19 survey hides ransomware in Canadian university attack
This post was authored by Jérôme Segura with contributions from Hossein Jazi, Hasherezade and Marcelo Rivero. In recent weeks, we’ve...
This post was authored by Jérôme Segura with contributions from Hossein Jazi, Hasherezade and Marcelo Rivero. In recent weeks, we’ve...
It can be a very convincing trick… “You can check the number in your display online sir. You’ll see I’m...
Finland: Hackers have stolen data from the Vastaamo Psychotherapy Center. Folders with personal information of tens of thousands of Suomi...
Energy Company Enel Group has yet again been hit by malware, making it a second this year. The energy...
News overview Q3 was relatively calm from a DDoS perspective. There were no headline innovations, although cybercriminals did continue to...
A curated list of Android Security materials and resources For Pentesters and Bug Hunters.BlogAAPG - Android application penetration testing guide...
A project to get a Linux shell running on iOS, using usermode x86 emulation and syscall translation. For the current...
We know that proving the efficacy of your vulnerability management program is no easy task. But with the Goals and...
A ransomware gang has made headlines for donating a big chunk of stolen funds to two charities. Two separate donations...
Businesses have increasingly adopted IoT devices, especially amid the COVID-19 pandemic to keep their operations safe. Over the past year,...
Cyberattacks during the Covid-19 pandemic exposed the flawed systems of cybersecurity. We should glance at these attacks and learn new...
In autumn, experts recorded mass registration of domain names with the names of well-known brands in the .RU zoneSpecialists at...
A vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Features Scan the contents...
TASER (Testing And SEecurity Resource) is a Python resource library used to simplify the process of creating offensive security tooling,...
In this third installment of our series around 2021 security planning, we’re focused on SOC automation. In part one, we...
Posted by Julien Ahrens (RCE Security) on Oct 27RCE Security Advisoryhttps://www.rcesecurity.com 1. ADVISORY INFORMATION ======================= Product: God Kings Vendor URL:...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Google has recently released Chrome version 86.0.4240.111 to patch several holes. One is for a zero-day flaw – that means...
jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and...
An extensible application for penetration testers and software developers to decode/encode data into various formats.SetupDecoder++ can be either installed by...
When you start out with one of our vulnerability management solutions, Nexpose or InsightVM, one of the first things you...
The US Senate Judiciary Committee has asked the CEO of Twitter and Facebook to evaluate their role in “platforms’...
Cybercriminals are using a newly created Artificial Intelligence bot to generate and share deepfake nude images of women on the...
Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence...