Financial resources for small businesses grappling with COVID-19
The United States Congress recently passed the “Coronavirus Aid, Relief, and Economic Security Act” (the “CARES Act”). This legislation is...
The United States Congress recently passed the “Coronavirus Aid, Relief, and Economic Security Act” (the “CARES Act”). This legislation is...
On Feb 11, 2020, Microsoft released security updates to address a vulnerability in Microsoft Exchange that would allow an attacker...
At Rapid7, we have made it our top priority to uncover unmet customer needs and create value in new product...
Amid this Covid-19 lockdown, the use of video conferencing software has seen a rapid rise- be it work-related, teaching or...
If you read my previous blogpost, “Hunting APTs with YARA” then you probably know about the webinar we’ve done on...
Use angr inside GDB. Create an angr state from the current debugger state.Installpip install angrgdbecho "python import angrgdb.commands" >> ~/.gdbinitUsageangrgdb...
This is a second release of SSHPry tool, with multiple features added.Control of target's TTYBuilt-In KeyloggerConsole-Level phishingRecord & Replay previous...
Participants of the Zoom conference on the digital future of the country said that the transition to remote work and...
Due to the COVID-19 pandemic, people across the globe to stay at home. The quarantine has increased online shopping figures....
HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. This project was born...
Inspired by a conversation with Instacart's @nickelser on HackerOne, I've optimised and published Sandcastle – a Python script for AWS...
By Raphael Centeno and Llallum Victoria Many companies around the world have transitioned to work-from-home arrangements because of growing concerns...
It’s almost impossible not to rely on social networks in some way, whether for personal reasons or business. Sites such...
New data by researchers has demonstrated that cybercriminals are preying on people's concerns regarding the COVID-19 pandemic and carrying out...
Following a recent disclosure about Iranian hackers targeting on vulnerabilities in VPN servers like the Pulse Secure, Palo Alto Systems,...
Tweetshell is an Shell Script to perform multi-threaded brute force attack against Twitter, this script can bypass login limiting and...
Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice...
By David Fiser (Security Researcher) We discovered 8,000 Redis instances that are running unsecured in different parts of the world,...
Armenian President Armen Sarkisian signed the bill on amendments to the law "on the legal regime of emergency" and "on...
Cyber-security is an important concern for everyone working from these days, amid the lock-down due to the current Coronavirus pandemic....
The previous story described an unusual way of distributing malware under disguise of an update for an expired security certificate....
This experimental fuzzer is meant to be used for API in-memory fuzzing.The design is highly inspired and based on AFL/AFL++.ATM...
In 30 seconds, this attack can learn which networks a MacOS computer has connected to before, and plant a script...
Wow, this past week has been a pretty long year for Zoom.As the COVID-19 global pandemic moved the whole knowledge-working...