Maze Ransomware: What you need to know and How to protect from being hit by Maze!
Cognizant Technology Solutions Corp., an IT giant with 3000 employees was recently hit by a strain of sophisticated Windows Ransomware...
Cognizant Technology Solutions Corp., an IT giant with 3000 employees was recently hit by a strain of sophisticated Windows Ransomware...
Pwned is a simple command-line python script to check if you have a password that has been compromised in a...
Project iKy is a tool that collects information from an email and shows results in a nice visual interface.Visit the...
Avast, a security firm, discovered in their research the growing scale of adware. According to the report, around 72% of...
According to the research of Positive technologies, every second mobile banking application has a vulnerability through which fraudsters can steal...
should-i-trust is a tool to evaluate OSINT signals for a domain.Requirementsshould-i-trust requires API keys from the following sources:Censys.io - Free...
WOTOP is a tool meant to tunnel any sort of traffic over a standard HTTP channel.Useful for scenarios where there's...
Here at Malwarebytes, we’re no strangers to using virtual private networks (VPNs) to protect our privacy while browsing online. Regular...
The SITE Intelligence Group, a non-governmental US-based consultancy group that monitors online activities of international terrorist groups and tracks global...
From remote administration and jackpotting, to malware sold on the Darknet, attacks against ATMs have a long and storied history. ...
This tool is written in python2, the purpose of this tool is to parse all the results from Bing search.Basically...
Lulzbuster is a very fast and smart web directory and file enumeration tool written in C.Usage$ lulzbuster -H __ __...
We are pleased to announce that we released Triton v0.8 under the terms of the Apache License 2.0 (same license...
On Monday, ZecOps released a report about a couple concerning vulnerabilities with the Mail app in iOS. These vulnerabilities would...
Pavel Durov, the Creator of the social network Vkontakte and the Telegram messenger, said that the world can expect a...
“The country is in the middle of a major digital transformation, and organizations like Jio have played a big part...
Finally! The days of whining about the limited number of participants you could add to WhatsApp’s group video and audio...
How much money and effort does it take to become a good reverse engineer? Do you even need to be...
As you may already know from our social network posts, we have rescheduled the SAS 2020 conference for November 18-21...
Modern Denial-of-service ToolKitMain windowMethods:Method Target Description SMS +PHONE SMS & CALL FLOOD NTP IP:PORT NTP amplification is a type of...
A modular framework designed to chain and automate security tests. It parses target definitions from the command line and runs...
Staying at home is our new normal, which means many of us have wound up with a little more free...
When it comes to securing your sensitive, personally identifiable information against criminals who can engineer countless ways to snatch it...
According to the Lidové noviny newspaper, a foreign state may be behind the cyberattacks, and hacker groups from Russia may...