Tscopy – Tool to parse the NTFS $MFT file to locate and copy specific files
Introducing TScopyIt is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the...
Introducing TScopyIt is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the...
Posta is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit postMessage vulnerabilities, and...
Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
10,000+ unpatched ABUS Secvest home alarm systems could be remotely disabled exposing customers to intrusions and thefts. Researchers from Eye Security have...
The cybersecurity community has lost its star, the popular hacker Dan Kaminsky has passed away. The popular cyber security researcher...
ToxicEye is a new Remote Access Trojan (RAT) that exploits the Telegram service as part of it command and control...
In September 2020, the cashback reward program ShopBack suffered a data breach. The incident exposed over 20 million unique email...
Hackers reportedly gained access to blueprints of the latest Apple developments by attacking the servers of the Taiwanese company Quanta...
It appears that the developers of the ‘Sysrv’ botnet have been working hard in putting out a more sophisticated version...
Attackers distribute offers to install the "latest update" of the messenger disguised as official Facebook posts. Victims risk losing access...
The Telegram service is being exploited by operators of a new Remote Access Trojan (RAT) to keep control of their...
While Apple was working on the preparations for the 'Spring Loaded' event that went live on Tuesday, 20th April, the...
Explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you will find: flag...
This is a tool developed in Python which uses the native Slack APIs to extract 'interesting' information from a Slack...
A new Linux botnet uses Tor through a network of proxies using the Socks5 protocol, abuses legitimate DevOps tools, and other emerging techniques....
On Sunday, Europol will end a three-month-long process of dismantling the Emotet botnet by triggering a time-activated .dll to delete...
The Cybersecurity and Infrastructure Security Agency (CISA) has reported finding the SUPERNOVA web shell collecting credentials on a SolarWinds Orion...
A written proposal to ban several uses of artificial intelligence (AI) and to place new oversight on other “high-risk” AI...
If you’ve been shopping for a VPN service in 2021, you’ve probably noticed how many providers are available. Using a...
Cookie – the term which most of you are familiar with. Every single time when you open a new website,...
A huge ransomware campaign seems to be underway to attack QNAP devices globally and customers can now locate their files...
The cybersecurity firm Trend Micro disclosed that the threat actors are once again using security solutions as attack vectors and...
Kaspersky has been following the ransomware landscape for years. In the past, we’ve published yearly reports on the subject: PC...