A week in security (February 17 – 23)
Last week on Malwarebytes Labs, we highlighted the benefits and concerns of identity-as-a-service (IDaaS), an identity management scheme deployed from...
Last week on Malwarebytes Labs, we highlighted the benefits and concerns of identity-as-a-service (IDaaS), an identity management scheme deployed from...
With the threat landscape becoming more hostile to businesses, small- and medium-sized businesses (SMBs) are often finding it difficult to...
Google's Cloud Vision API is a Google Artificial Intelligence (AI) tool that recognizes an image and what's in it and...
Miami, February 19, 2020 - Faraday is opening 2020 by strengthening their releases using the featured cybersecurity worldwide events calendar,...
This software is a subdomain enumeration tool.Purposednssearch takes an input domain ( -domain parameter ) and a wordlist ( -wordlist...
LFI Exploitation toolA little python tool to perform Local file inclusion.Liffy v2.0 is the improved version of liffy which was...
This blog was coauthored by Bria Grangard and Justin Buchanan.Every business is becoming a software business, and web applications are...
Russian Foreign Ministry spokeswoman Maria Zakharova commented on the US statement that Russia is spreading fakes about the coronavirus. The...
Hackers become increasingly serious in their game as they begin targeting sensitive data that incorporates pain diary entries from veterans'...
Slickwraps, a mobile device case retailer that specializes in designing and assembling the most precision-fitted phone cases in the world...
Beware! People who have blind faith in the internet and tend to believe almost anything that they view or come...
DLLPasswordFilterImplant is a custom password filter DLL that allows the capture of a user's credentials. Each password change event on...
ohmybackup - Scan Victim's Backup Directories & Backup FilesohmybackupScans backup folders on target sites. Searches archived files in the folders...
The international community, following Georgia, the UK and the US, continues to publish statements condemning the cyberattack allegedly committed by...
This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities....
It's an information security audit tool that creates intelligent wordlists based on the content of the target page.Help usSee some...
The ticket reselling sites olympictickets2020.com and eurotickets2020.com reportedly have been compromised with Magecart POS skimming malware. Magecart was first spotted...
With the rise in the number of records ‘exposed’ by cloud misconfigurations year after year from 2018 to 2019 by...
Simple way to disable/rename buttons from a task manager.Installationgit clone https://github.com/Mrakovic-ORG/TaskManager-Button-Disablercd TaskManager-Button-DisablerTaskManager Button Disablerdotnet buildFeaturesRename kill proccess buttonDisable kill proccess...
Linux Privilege Escalation through SUDO abuse.If you like the tool and for my personal motivation so as to develop other...
We are thrilled to announce that global research and consulting firm Frost & Sullivan has named Rapid7 as the Global...
Despite their name, the RobbinHood cybercriminal gang is not stealing from the rich to give to the poor. Instead, these...
Joy all around for the social media fanatics who had gotten quite bored of WhatsApp being their only source of...
Since last year's summers, Chinese hackers have been targeting South Asian companies that own online gambling and betting websites. The...