Targeted Malware Reverse Engineering Workshop follow-up. Part 1
On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo, Senior Security Researchers from our Global...
On April 8, 2021, we conducted a webinar with Ivan Kwiatkowski and Denis Legezo, Senior Security Researchers from our Global...
Run Ubuntu GUI on your termux with much features. FeaturesFixed Audio Output Lightweight {Requires at least 4GB Storage} Katoolin3 tool...
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.DescriptionThis is a bash script...
One company stood out in a cascade of U.S. sanctions imposed on Thursday on Russian cybersecurity companies and officials allegedly...
The primary feature of the BazarLoader downloader, which is written in C++, is to download and execute additional modules. BazarLoader...
U.S. federal authorities are investigating a safety violation at Codecov, which works on selling a tool that allows developers to...
The Indian Computer Emergency Response Team (CERT-In) has cautioned WhatsApp clients in India of various vulnerabilities it identified in the...
Password list generator for password spraying - prebaked with goodies Version 1.4 Generates permutations of Months, Seasons, Years, Sports Teams...
Validate large HTTP-based attack surfaces in a very fast way. Heavily inspired by Aquatone. Why?When I utilize Aquatone to flyover...
Fedir Hladyr (35), a Ukrainian national was sentenced today to 10 years in prison for his role in the financially...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Experts warn of malware campaigns delivering the BazarLoader malware abusing popular collaboration tools like Slack and BaseCamp. Since January, researchers...
Google Project Zero security team has updated its vulnerability disclosure policy, it gives users 30 days to patch flaws before...
Navalny's team is now investigating and identifying the source of the leak. The team assured them that they did not...
On 15 April, the US Treasury Department put 25 Russian companies, six of which are IT companies, on its sanctions...
By now it's a well-known fact that most of the students are relying on online learning and video-conferencing apps due...
On Wednesday, IBM reported that its cyber-security unit has discovered more digital attacks targeting the global COVID-19 vaccine supply chain...
Cryptocurrency rewards portal, Celsius has witnessed a data breach, with the personal details of its clients disclosed by a third-party...
An open source serveo/ngrok alternative.DeployBuilds are made automatically for each commit to the repo and are pushed to Dockerhub. Builds...
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN...
SolarWinds supply chain attack also impacted six European Union institutions, European Commissioner for Budget and Administration confirmed. European Commissioner for...
Cybersecurity provider Juniper Networks addressed a critical vulnerability that could be exploited by attackers to remotely hijack or disrupt vulnerable...
14-year old Michael (not his real name) from Scandinavia first visited Omegle, the video online chat that has become hugely...
The National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) have...