Epic Manchego gang uses Excel docs that avoid detection
A recently discovered cybercrime gang, tracked as Epic Manchego, is using a new technique to create weaponized Excel files that...
A recently discovered cybercrime gang, tracked as Epic Manchego, is using a new technique to create weaponized Excel files that...
Argentina’s official immigration agency, Dirección Nacional de Migraciones, is the last victim of the Netwalker ransomware operators. Argentina’s official immigration...
Visa issued a warning regarding a new credit card JavaScript skimmer, tracked as Baka, that implements new features to evade...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
WhatsApp addressed six previously undisclosed flaws in its app and disclosed them on a new dedicated security advisory site. WhatsApp announced...
The US Federal Communications Commission (FCC) estimates the cost of a full replacement of all Huawei and ZTE hardware on...
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and...
Script that allows the easy creation of OpenVPN endpoints in any AWS region. To create a VPN endpoint is done...
Create a VPS on Google Cloud Platform or Digital Ocean easily with the docker for pentest included to launch the...
hardcodes is a utility for searching strings hardcoded by developers in programs. It uses a modular tokenizer that can handle...
wordlist_generator generates wordlists with unique words with techniques mentioned in tomnomnom's report "Who, What, Where, When". It takes URLs from...
There are better ways than managing vulnerabilities with spreadsheets, especially when you are working with several tools. We know it’s...
In August, Malwarebytes Labs analyzed the damage caused by COVID-19 to business cybersecurity. Because of immediate, mandated transitions to working...
The Social Messaging app WhatsApp has been open about its bugs and vulnerabilities recently. To be vocal about the issue,...
This past spring, as the COVID-19 pandemic took hold, online learning became the new norm as universities and classrooms around...
h4rpy is an automated WPA/WPA2 PSK attack tool, wrapper of aircrack-ng framework.h4rpy provides clean interface for automated cracking of WPA/WPA2...
SNIcat is a proof of concept tool that performs data exfiltration, utilizing a covert channel method via. Server Name Indication,...
Posted by Pramod Rana on Sep 04It is no secret that today we have more vulnerabilities than we can assess...
Posted by Red Timmy Security on Sep 04Hi, we have just released an exploit for CVE-2020-13162. This vulnerability affects the...
Posted by Pietro Oliva via Fulldisclosure on Sep 04Vulnerability title: Noise-Java ChaChaPolyCipherState.encryptWithAd() insufficient boundary checks Author: Pietro Oliva CVE: CVE-2020-25021...
Posted by Pietro Oliva via Fulldisclosure on Sep 04Vulnerability title: Noise-Java AESGCMOnCtrCipherState.encryptWithAd() insufficient boundary checks Author: Pietro Oliva CVE: CVE-2020-25023...
Posted by Pietro Oliva via Fulldisclosure on Sep 04Vulnerability title: Noise-Java AESGCMFallbackCipherState.encryptWithAd() insufficient boundary checks Author: Pietro Oliva CVE: CVE-2020-25022...
PCI DSS is short for Payment Card Industry Data Security Standard. Every party involved in accepting credit card payments is...
Associate Professor of computer science at the Russian University of Economics, Alexander Timofeev said that hackers can use Bluetooth to...