Misp-Dashboard – A Dashboard For A Real-Time Overview Of Threat Intelligence From MISP Instances
A dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The dashboard can...
A dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The dashboard can...
On the Rapid7 Labs team, we’re constantly looking for ways to give defenders a boost in the work they need...
By Lorin Wu (Mobile Threats Analyst) We recently discovered several malicious optimizer, booster, and utility apps (detected by Trend Micro...
A newly discovered attack campaign has been abusing the online storage platform Bitbucket to maintain and update a wide assortment...
“I have no idea how this app from my bank works, and I don’t trust what I don’t understand.” Josh...
Ukranian Police arrested a 16 yrs old teenager last month on charges of attacking a local Internet Service Provider (ISP)...
Apple known for it's off the charts security features was recently troubled with hacks, malware and phishing attacks staining its...
Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.InstallationDownload precompiled...
Dufflebag is a tool that searches through public Elastic Block Storage (EBS) snapshots for secrets that may have been accidentally...
In part one of our four-part series on security in the cloud, we discussed the AWS shared responsibility model and...
The steady parade of US data privacy legislation continued last month in Washington with the introduction of an improved bill...
Specialized service for collecting data on cybercrime in the financial sector, which will help counteract fraud in cyberspace, may appear...
Last week, Google has announced the cutting down of 'patch gap' in half for Chrome and the future plans of...
The Winnti, a China-linked threat group that has been active in the cyberspace since 2009 was found to be employing...
Qiling is an advanced binary emulation framework, with the following features:Cross platform: Windows, MacOS, Linux, BSDCross architecture: X86, X86_64, Arm,...
nfstream is a Python package providing fast, flexible, and expressive data structures designed to make working with online or offline...
That’s good news, right? Well, I’d say that’s a qualified “yes.” As I mentioned, it’s easy to change the implant...
In this sequel, wvu recounts the R&D (in all its imperfect glory) behind creating a Metasploit module for the DOUBLEPULSAR...
The cybercriminal group TA505 has reportedly changed up its tactics again, now engaging in phishing campaigns that leverage attachments with...
Last week on Malwarebytes Labs, we looked at the strengths and weaknesses of the Zero Trust model, gave you the...
According to the deputy head of the National Coordination Center for Computer Incidents of the FSB, Nikolai Murashov, encryption viruses...
According to studies, with an increase of 50% malware attacks have known no bounds in the past year. Most common...
WhatTheHack is a collection of challenge based hack-a-thons including student guide, proctor guide, lecture presentations, sample/instructional code and templates.What, Why...
Simple python tool that goes through a list of URLs trying CRLF and open redirect payloads. ▪ ▐ ▄ ▐▄▄▄▄▄▄...