DLLHSC – DLL Hijack SCanner A Tool To Assist With The Discovery Of Suitable Candidates For DLL Hijacking
DLL Hijack SCanner - A tool to generate leads and automate the discovery of candidates for DLL Search Order HijackingContents...
DLL Hijack SCanner - A tool to generate leads and automate the discovery of candidates for DLL Search Order HijackingContents...
A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on...
The UK’s National Cyber Security Centre (NCSC) urges UK organizations to install the patches for the recently disclosed vulnerabilities in...
Google has addressed a new zero-day flaw in its Chrome browser that has been actively exploited in the wild, the...
More than 6,000 surveillance cameras in Russia are open to the public, some of them are located at industrial enterprises...
The security researchers at 360 Netlab have discovered a new botnet that is targeting and converting the infected routers, DVRs,...
WeLeakInfo.com was an information breach notification service that was permitting its clients to check if their credentials have been compromised...
Linux kernel distributions appear explicitly susceptible to recently uncovered vulnerabilities. In the iSCSI module, which is used for viewing shared...
Netgear has released security and firmware updates for its JGS516PE Ethernet switch to address 15 vulnerabilities, including a critica remote...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Google released proof-of-concept code to conduct Spectre attacks against its Chrome browser to share knowledge of browser-based side-channel attacks. Google...
Three 15-year-old flaws in Linux kernel could be exploited by local attackers with basic user privileges to gain root privileges on...
Business communication between defense industry employees in WhatsApp, Skype and Zoom has become stricter suppressed by the managementA source in...
Brewing giant Molson Coors revealed on Thursday that it has experienced a ‘cybersecurity incident’ that has disrupted its operations and...
IBM X-Force intelligence has observed an increase in the Cutwail botnet-led Dridex-related network attacks. Dridex is shipped via e-mail with...
I've wrote this program as a proof of concept to test the idea of be able to send tcp stream...
Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline This tool is available when...
The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT...
Kaspersky researchers spotted a new variant of the XCSSET Mac malware that compiled for devices running on Apple M1 chips....
An actor claimed to have registered one of the domains of WeLeakInfo, accessed details of 10000+ WeLeakInfo’ s customers, and...
In March 2020, the self-proclaimed "kinder, smarter social network" Liker suffered a data breach, allegedly in retaliation for the Gab...
The Microsoft Exchange attacks using the ProxyLogon vulnerability, and previously associated with the dropping of malicious web shells, are taking...
Hackers were able to gain access to camera feeds from Verkada, a tech company that specializes in video security and...
The number of Americans influenced by a cyber assault on a cloud facilitating and IT services provider has expanded by...