Fapro – Free, Cross-platform, Single-file mass network protocol server simulator
FaPro is a Fake Protocol Server tool, Can easily start or stop multiple network services.The goal is to support as...
FaPro is a Fake Protocol Server tool, Can easily start or stop multiple network services.The goal is to support as...
White hat hackers earned $1.88 million at the Tianfu Cup hacking contest by finding vulnerabilities in popular software. The Tianfu...
Twitch provided an update for the recent security breach, the company confirmed that it only had a limited impact on...
dokrscout is a tool to automate the finding of Install wordliststo start scanning you'll need some dork lists and to...
The customers of Banco Pichincha, the largest bank in Ecuador, are still experiencing service disruptions after a massive cyberattack hit...
TrickBot operators are back and expand the distribution channels with partnership with cybercrime affiliates. The operators behind the infamous TrickBot...
Protect Against Subdomain Takeoverscans Amazon Route53 across an AWS Organization for domain records vulnerable to takeovervulnerable domains in Google Cloud...
Russia-linked TA505 group leverages a lightweight Office file to spread malware in a campaign, tracked as MirrorBlast, aimed at financial...
A simple pure-Python network packet sniffer. Packets are disassembled as they arrive at a given network interface controller and their...
The U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) linked roughly $5.2 billion worth of Bitcoin transactions to ransomware. The...
IT and consulting giant Accenture confirmed a data breach after the ransomware attack conducted by LockBit operators in August 2021....
crawlergo is a browser crawler that uses chrome headless mode for URL collection. It hooks key positions of the whole...
Cybersecurity provider Juniper Networks released more than 40 security advisories to address over 70 vulnerabilities that affect its solutions. Cybersecurity...
A group of researchers from the Graz University of Technology and CISPA Helmholtz Center for Information Security devised a new...
NetworKit is an open-source tool suite for high-performance network analysis. Its aim is to provide tools for the analysis of...
You may often see .exe files but you may not know what they are. Is it the same as an...
A joint cybersecurity advisory published by US agencies revealed that three ransomware attacks on wastewater systems this year. A joint cybersecurity advisory published...
WhatsApp made available end-to-end encrypted chat backups on iOS and Android to prevent anyone from accessing user chats. WhatsApp is...
The popular Google’s VirusTotal scanning service has published an interesting analysis of more than 80 Million ransomware samples. VirusTotal has...
Researchers at Imperva uncovered a new ad injection campaign based on an adblocker named AllBlock. The AllBlock extension was available...
ForgeCert uses the BouncyCastle C# API and a stolen Certificate Authority (CA) certificate + private key to forge certificates for...
Google revealed to have sent roughly 50,000 alerts of state-sponsored phishing or hacking attempts to customers since January. Google announced...
The Hillel Yaffe Medical Center in Hadera, Israel, was hit by a ransomware attack that was defined by Israel’s National...
Taiwanese electronics technology giant Acer discloses a security breach suffered by its after-sales service systems in India after an isolated...