Congrats to the winners of the 2020 Metasploit community CTF
After four days of competition and a whole lot of “trying harder,” we have the winners of this year's Metasploit...
After four days of competition and a whole lot of “trying harder,” we have the winners of this year's Metasploit...
As cyber-attacks become more and more frequent against entities of all sizes, penetration testing is becoming more important to identify...
PCFG = Probabilistic Context Free GrammarPCFG = Pretty Cool Fuzzy GuesserIn short: A collection of tools to perform research into...
Damn Vulnerable NodeJS Application (DVNA) is a simple NodeJS application to demonstrate OWASP Top 10 Vulnerabilities and guide on fixing...
The latest ransomware has attacked 'TV Eyes,' a company that offers campaign monitoring services to TV and radio news broadcasts....
Think you're an expert at Xbox? Think you can find a bug in Xbox Live? Well, Microsoft might pay you...
Here, a new Dalvik bytecode decompiler, GDA(this project started in 2013 and released its first version 1.0 in 2015 at...
Scope control, scope scanner and progress tracker for easier working on a bug bounty or pentest project.What is this tool...
Cybercriminals are exploiting fears over the outbreak of Coronavirus in China, sending out emails with malicious Word attachments purportedly providing...
A real scandal began with the rights of journalists, the media and freedom of speech in Ukraine. The Ukrainian cyber...
Created by British start-up Exscientia and Japanese pharmaceutical firm Sumitomo Dainippon Pharma a drug molecule “artificial" by artificial intelligence (AI)...
A proposal comes from Apple engineers working at WebKit, the core component of the Safari web browser, to institutionalize the...
Social Media giant Facebook is to pay an amount of $550 million as a settlement in what appears to be...
A leading cyber-security firm recently alerted all the netizens about a vulnerability discovered in the measurement tools that support the...
The OWASP Risk Assessment Framework consist of Static application security testing and Risk Assessment tools, Eventhough there are many SAST...
MassDNS is a simple high-performance DNS stub resolver targetting those who seek to resolve a massive amount of domain names...
When a new vulnerability prompts discussion on Twitter or hits media outlets, the security community collectively participates in a familiar...
We’ve previously discussed threats to managed service providers (MSPs), covering their status as a valuable secondary target to both an...
The FSB of the Russian Federation reported that it was possible to install another email service that was used by...
An internal confidential document from the United Nations, leaked to The New Humanitarian and seen by The Associated Press, says...
s3enum is a tool to enumerate a target's Amazon S3 buckets. It is fast and leverages DNS instead of HTTP,...
A Python based scanner to find potential SSRF parameters in a web application.MotivationSSRF being one of the critical vulnerabilities out...
On our latest episode of Security Nation, we spoke with a true hero: Chris Hadnagy, founder of the Innocent Lives...
Phishing, a cyberattack method as old as viruses and Nigerian Princes, continues to be one of the most popular means...