Peirates – Kubernetes Penetration Testing Tool
What is Peirates?Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. It...
What is Peirates?Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. It...
GoKart is a static analysis tool for Go that finds vulnerabilities using the SSA (single static assignment) form of Go...
Spook.js is a new side-channel attack on modern processors that can allow bypassing Site Isolation protections implemented in Google Chrome. Boffins...
Technology giant Olympus announced it was the victim of a ransomware attack and is currently investigating the extent of the...
A new banking trojan dubbed maxtrilha (due to its encryption key) has been discovered in the last few days and targeting customers...
The Department of Justice and Constitutional Development of South Africa was hit by a ransomware attack that crippled bail services....
Google introduces Private Compute Services, a collection of services aimed at designing to improve privacy in the Android operating system....
TeamTNT hacking group has enhanced its abilities by adding a set of tools that allow it to target multiple operating...
A recent study on a backdoor called Sidewalk has shown its attribution with Grayfly, the Chinese spy arm termed the...
Ransomware groups have shown no signs of declining their attacks on hospitals, apparently intensifying attacks on healthcare institutions as countries...
A new botnet dubbed Mēris has launched a record-breaking distributed denial-of-service (DDoS) attack on Russian internet company Yandex. The botnet...
AutoHarness is a tool that automatically generates fuzzing harnesses for you. This idea stems from a concurrent problem in fuzzing...
ODBParser is a tool to search for PII being exposed in open databases. ONLY to be used to identify exposed...
Recently we observed that part of the REvil ransomware infrastructure was up and running again, now we can confirm that...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Cisco fixed multiple high-severity flaws in the IOS XR software that can allow attackers to trigger a DoS condition, elevate...
The Verkhovna Rada of Ukraine adopted the bill "On virtual assets", which will legalize cryptocurrency and virtual hryvnia.The bill on...
NBC News, an American broadcaster has published a report on the data theft of millions of school children and how...
In July, a hacker invaded the email accounts of the Virginia Military Department and the Virginia Defense Force, told a...
Hackers breached the United Nations' computer network and stole data, according to researchers at cybersecurity firm Resecurity, According to Bloomberg, the...
A newly found side-channel attack targeting Google Chrome might allow an attacker to use a Spectre-style attack to bypass the...
Pollenisator is a tool aiming to assist pentesters and auditor automating the use of some tools/scripts and keep track of...
"Karta" (Russian for "Map") is an IDA Python plugin that identifies and matches open-sourced libraries in a given binary. The...
SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the U.S. and...