Facial recognition: tech giants take a step back
Last week, a few major tech companies informed the public that they will not provide facial recognition software to law...
Last week, a few major tech companies informed the public that they will not provide facial recognition software to law...
What if hackers can spy and record your conversation without a digital device? What if your conversations could be retrieved...
Auto Phishing form-based websites. This tool can automatically detect inputs on html form-based websites to create a phishing page.Features:Auto detect...
SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a...
In case you missed it, we introduced Network Traffic Analysis for our InsightIDR and MDR customers a few months back....
A cyber espionage operation used fake job offers, sent via LinkedIn messages, to target employees at aerospace and military companies...
This blog post was authored by Hossein Jazi and Jérôme Segura On June 10, we found a malicious Word document...
Trouble is potentially brewing in Internet of Things (IoT) land, even if the consequences may still be a little way...
According to Roskachestvo, the Internet of things devices can violate the physical and information security of the owner if hackers...
Cybersecurity experts have denied incidents of any DDoS s attacks in recent times. However, the attacks on T-Mobile's services that...
A database with the data of Russians stuck abroad because of the coronavirus and returning to their homeland was put...
Since 2016, when India decided to go cashless the growth of online payments increased exponentially but not without risks. Online...
Attackers can maliciously redirect users on websites sharing counterfeit products, adult content or videos and dupe them into installing malware...
Thanks to the coronavirus pandemic, the role of the Internet in our lives has undergone changes, including irreversible ones. Some...
TeaBreak is a simple burp extension for security researchers and bug bounty hunters for helping them to increase their work...
Hijacking legitimate digital signatures is a technique that can be used during red team assessments in order to sign PowerShell...
Before I bought a house a few years ago, my understanding of mortgages was pretty shaky at best. I only...
The National Security Service of Armenia (NSS) finds out that the personal data of 3,500 patients with coronavirus and their...
SecretFinder is a python script based on LinkFinder, written to discover sensitive data like apikeys, accesstoken, authorizations, jwt,..etc in JavaScript...
How next-gen SIEM security solutions increase time to value in a modern threat environmentThe changing security landscape demands the most...
This blog post is part one in a three-part series on macro authentication.You may have come across macro authentication when...
We are going to talk today about something you’ve likely heard of before: VPNs, or Virtual Private Networks. We at...
Become a Patron! Installpip install fsocietyUpdatepip install --upgrade fsocietyUsageusage: fsociety A Penetration Testing Frameworkoptional arguments: -h, --help show this help...
Become a Patron! The increasing vulnerability of U.S. space systems lately has incited its rivals to begin with their development...