Article: Eye on AI: Taking over cybersecurity - Times of India - published over 2 years ago. Content: The sheer number of cyber-attacks that need to be analyzed nowadays puts AI and machine learning at the core of cybersecurity. Ad. Cyber analysts use ... https://timesofindia.indiatimes.com/blogs/voices/eye-on-ai-taking-over-cybersecurity/ Published: 2022 08 07 22:33:32 Received: 2022 08 09 09:41:32 Feed: Google Alert – cybersecurity Source: Google Alert Category: News Topic: Cyber Security |
Article: BFSI sector adapting a dynamic cybersecurity stance - published over 2 years ago. Content: Banks can follow the RBI guidelines related to the cyber security framework, while the insurance sector can follow guidelines issued by IRDA. https://bfsi.eletsonline.com/bfsi-sector-adapting-a-dynamic-cybersecurity-stance/ Published: 2022 08 08 08:03:19 Received: 2022 08 09 09:41:32 Feed: Google Alert – cybersecurity Source: Google Alert Category: News Topic: Cyber Security |
|
Article: LibAFL: A Framework to Build Modular and Reusable Fuzzers - published over 2 years ago. Content: submitted by /u/domenukk [link] [comments] https://www.reddit.com/r/netsec/comments/wjxxia/libafl_a_framework_to_build_modular_and_reusable/ Published: 2022 08 09 08:31:45 Received: 2022 08 09 09:09:22 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
|
Article: Is the financial sector at risk of being hit with DDoS attack? - published over 2 years ago. Content: The financial sector has experienced a significant rise in cybercrime activity over the past few years as the following stats from the UK COVID CRIME INDEX 2021 REPORT show. Three-quarters (74%) of banks and insurers experienced rise in cybercrime since the pandemic began. IT security, cybercrime, fraud, or risk department budgets had been cut by almost... https://www.ecrcentre.co.uk/post/is-the-financial-sector-at-risk-of-being-hit-with-ddos-attack Published: 2022 08 09 08:43:14 Received: 2022 08 09 08:52:33 Feed: The Eastern Cyber Resilience Centre Source: National Cyber Resilience Centre Group Category: News Topic: Cyber Security |
Article: Parallels Desktop for Mac Updated With Support for ProMotion Displays and M1 Ultra Chip - published over 2 years ago. Content: https://www.macrumors.com/2022/08/09/parallels-for-mac-support-promotion-m1-ultra/ Published: 2022 08 09 07:06:18 Received: 2022 08 09 08:31:22 Feed: MacRumors : Mac News and Rumors Source: MacRumors : Mac News and Rumors Category: News Topic: Cyber Security |
|
Article: Researchers Uncover Classiscam Scam-as-a-Service Operations in Singapore - published over 2 years ago. Content: https://thehackernews.com/2022/08/researchers-uncover-classiscam-scam-as.html Published: 2022 08 09 07:07:03 Received: 2022 08 09 08:28:35 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Chinese Hackers Targeted Dozens of Industrial Enterprises and Public Institutions - published over 2 years ago. Content: https://thehackernews.com/2022/08/chinese-hackers-targeted-dozens-of.html Published: 2022 08 09 07:25:36 Received: 2022 08 09 08:28:35 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Researchers Uncover Classiscam Scam-as-a-Service Operations in Singapore - published over 2 years ago. Content: https://thehackernews.com/2022/08/researchers-uncover-classiscam-scam-as.html Published: 2022 08 09 07:07:03 Received: 2022 08 09 08:21:46 Feed: The Hacker News Source: The Hacker News Category: News Topic: Cyber Security |
|
Article: Chinese Hackers Targeted Dozens of Industrial Enterprises and Public Institutions - published over 2 years ago. Content: https://thehackernews.com/2022/08/chinese-hackers-targeted-dozens-of.html Published: 2022 08 09 07:25:36 Received: 2022 08 09 08:21:46 Feed: The Hacker News Source: The Hacker News Category: News Topic: Cyber Security |
|
Article: Enterprises are actively consolidating security vendors and integrating technologies - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/consolidating-security-vendors-video/ Published: 2022 08 09 08:00:30 Received: 2022 08 09 08:08:55 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
Article: Cyber syndicates are working with amateur attackers to target businesses - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/cyber-syndicates-video/ Published: 2022 08 09 08:00:31 Received: 2022 08 09 08:08:55 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
|
Article: Advisory: Cisco Small Business RV Series Routers Web Filter Database Update Command Injection Vulnerability - published over 2 years ago. Content: submitted by /u/g_e_r_h_a_r_d [link] [comments]... https://www.reddit.com/r/netsec/comments/wjx1p3/advisory_cisco_small_business_rv_series_routers/ Published: 2022 08 09 07:34:33 Received: 2022 08 09 07:48:52 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
|
Article: NHS Works To Restore 111 System After Cyber-Attack Causes Delays - published over 2 years ago. Content: https://www.silicon.co.uk/security/cyberwar/nhs-111-attac-470291 Published: 2022 08 09 07:30:27 Received: 2022 08 09 07:41:42 Feed: Silicon UK – Security Source: Silicon UK Category: News Topic: Cyber Security |
Article: Understanding your attack surface is key to recognizing what you are defending - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/understanding-attack-surface/ Published: 2022 08 09 04:30:10 Received: 2022 08 09 05:10:06 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
|
Article: Introducing the book: If It’s Smart, It’s Vulnerable - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/mikko-hypponen-book-if-its-smart-its-vulnerable-video/ Published: 2022 08 09 03:30:01 Received: 2022 08 09 04:08:37 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
|
Article: Dissecting Google’s Titan M chip: Vulnerability research challenges - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/titan-m-chip-vulnerability-research-challenges-video/ Published: 2022 08 09 04:00:19 Received: 2022 08 09 04:08:37 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
Article: Backdoor.Win32.Guptachar.20 / Insecure Credential Storage - published over 2 years ago. Content: https://seclists.org/fulldisclosure/2022/Aug/5 Published: 2022 08 09 03:42:54 Received: 2022 08 09 04:03:36 Feed: Full Disclosure Source: Full Disclosure Category: Alerts Topic: Vulnerabilities |
|
Article: NetRise Platform provides continuous monitoring of XIoT firmware vulnerabilities - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/netrise-platform/ Published: 2022 08 09 02:00:47 Received: 2022 08 09 03:09:03 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
|
Article: HYAS Confront gives DevSecOps teams complete visibility into their production environment - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/hyas-infosec-confront/ Published: 2022 08 09 02:10:47 Received: 2022 08 09 03:09:03 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
Article: 5 key things we learned from CISOs of smaller enterprises survey - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/5-key-things-we-learned-from-cisos-of-smaller-enterprises-survey/ Published: 2022 08 09 03:00:55 Received: 2022 08 09 03:09:02 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
|
Article: Application Security Report 2022: Key Trends and Challenges - published over 2 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/application-security-report-2022-key-trends-and-challenges/ Published: 2022 08 09 03:00:00 Received: 2022 08 09 03:08:58 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: ISC Stormcast For Tuesday, August 9th, 2022 https://isc.sans.edu/podcastdetail.html?id=8122, (Tue, Aug 9th) - published over 2 years ago. Content: https://isc.sans.edu/diary/rss/28922 Published: 2022 08 09 02:00:02 Received: 2022 08 09 03:03:31 Feed: SANS Internet Storm Center, InfoCON: green Source: SANS Internet Storm Center, InfoCON: green Category: Alerts Topic: Vulnerabilities |
Article: Chinese scammers target kids with promise of extra gaming hours - published over 2 years ago. Content: https://go.theregister.com/feed/www.theregister.com/2022/08/09/china_minors_gaming/ Published: 2022 08 09 02:45:07 Received: 2022 08 09 03:01:58 Feed: The Register - Security Source: The Register Category: News Topic: Cyber Security |
|
Article: Auditing Crypto Wallets - published over 2 years ago. Content: submitted by /u/catlasshrugged [link] [comments] https://www.reddit.com/r/netsec/comments/wjqk25/auditing_crypto_wallets/ Published: 2022 08 09 01:43:35 Received: 2022 08 09 02:10:01 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
Article: Tata Communications enhances InstaCC platform to help users connect across varied channels - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/tata-communications-instacc/ Published: 2022 08 09 01:05:20 Received: 2022 08 09 02:09:08 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
|
Article: Dark Reading News Desk: Live at Black Hat USA 2022 - published over 2 years ago. Content: https://www.darkreading.com/cloud/dark-reading-news-desk-live-at-black-hat-usa-2022 Published: 2022 08 05 13:00:00 Received: 2022 08 09 01:31:06 Feed: Dark Reading: Source: Dark Reading Category: News Topic: Cyber Security |
|
Article: NIST’s Post-Quantum Cryptography Standards - published over 2 years ago. Content: Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0 nor 1, but something much more complicated. In theory, such a computer can solve problems too complex for conventional computers. Current quantum computers are still toy prototype... https://www.schneier.com/blog/archives/2022/08/nists-post-quantum-cryptography-standards.html Published: 2022 08 08 11:20:29 Received: 2022 08 09 01:29:17 Feed: Schneier on Security Source: Schneier on Security Category: Cyber Security Topic: Cyber Security |
Article: China-linked spies used six backdoors to steal info from defense, industrial enterprise orgs - published over 2 years ago. Content: https://go.theregister.com/feed/www.theregister.com/2022/08/09/china_apt_kaspersky/ Published: 2022 08 09 00:23:18 Received: 2022 08 09 00:41:30 Feed: The Register - Security Source: The Register Category: News Topic: Cyber Security |
|
Article: deBridge Finance crypto platform targeted by Lazarus hackers - published over 2 years ago. Content: https://www.bleepingcomputer.com/news/security/debridge-finance-crypto-platform-targeted-by-lazarus-hackers/ Published: 2022 08 08 23:04:07 Received: 2022 08 08 23:22:13 Feed: Bleeping Computer - All News Feeds Source: Bleeping Computer Category: News Topic: Cyber Security |
Article: US treasury whips up sanctions for crypto mixer Tornado Cash - published over 2 years ago. Content: https://go.theregister.com/feed/www.theregister.com/2022/08/08/treasury_sanctions_tornado_cash_korea/ Published: 2022 08 08 23:00:06 Received: 2022 08 08 23:21:38 Feed: The Register - Security Source: The Register Category: News Topic: Cyber Security |
|
Article: Github Moves to Guard Open Source Against Supply Chain Attacks - published over 2 years ago. Content: https://www.wired.com/story/github-code-signing-sigstore/ Published: 2022 08 08 23:19:54 Received: 2022 08 08 23:21:36 Feed: Wired.com – Security Feed Source: Wired Category: News Topic: Cyber Security |
|
Article: HBO Max App for iOS Gaining SharePlay, Shuffle Button, Split Screen Support and More - published over 2 years ago. Content: https://www.macrumors.com/2022/08/08/hbo-max-ios-app-update/ Published: 2022 08 08 22:17:00 Received: 2022 08 08 23:11:17 Feed: MacRumors : Mac News and Rumors Source: MacRumors : Mac News and Rumors Category: News Topic: Cyber Security |
Article: US treasury whips up sanctions for crypto mixer Tornado Cash - published over 2 years ago. Content: https://go.theregister.com/feed/www.theregister.com/2022/08/08/treasury_sanctions_tornado_cash_korea/ Published: 2022 08 08 23:00:06 Received: 2022 08 08 23:10:08 Feed: The Register - Security Source: The Register - Security Category: Cyber Security Topic: Cyber Security |
|
Article: Cymulate names Maria Mastakas as COO and Carolyn Crandall as CMO and Chief Security Advocate - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/cymulate-executive-appointments/ Published: 2022 08 08 22:15:43 Received: 2022 08 08 23:08:19 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
|
Article: Vertiv appoints Jakki Haussler to its Board of Directors - published over 2 years ago. Content: https://www.helpnetsecurity.com/2022/08/09/vertiv-jakki-haussler/ Published: 2022 08 08 22:05:26 Received: 2022 08 08 22:29:09 Feed: Help Net Security - News Source: Help Net Security - News Category: Cyber Security Topic: Cyber Security |
Article: Sealighter - Easy ETW Tracing for Security Research - published over 2 years ago. Content: I created this project to help non-developers dive into researching Event Tracing for Windows (ETW) and Windows PreProcessor Tracing (WPP). Features Subscribe to multiple ETW and WPP Providers at once Automatically parse events into JSON without needing to know format Robust Event filtering including filter chaining and filter negation Output to Sta... http://www.kitploit.com/2022/06/sealighter-easy-etw-tracing-for.html Published: 2022 06 26 21:30:00 Received: 2022 08 08 21:50:42 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: EmoCheck - Emotet Detection Tool For Windows OS - published over 2 years ago. Content: Emotet detection tool for Windows OS. How to use Download EmoCheck from the Releases page. Run EmoCheck on the host. Check the exported report. Download Please download from the Releases page. Command options (since v0.0.2) Specify output directory for the report (default: current directory) /output [your output directory] or -output [you... http://www.kitploit.com/2022/06/emocheck-emotet-detection-tool-for.html Published: 2022 06 27 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: secureCodeBox (SCB) - Continuous Secure Delivery Out Of The Box - published over 2 years ago. Content: secureCodeBox is a kubernetes based, modularized toolchain for continuous security scans of your software project. Its goal is to orchestrate and easily automate a bunch of security-testing tools out of the box. For additional documentation aspects please have a look at our documentation website: Purpose of this Project The typical way to ensure appl... http://www.kitploit.com/2022/06/securecodebox-scb-continuous-secure.html Published: 2022 06 28 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
Article: Nimc2 - A C2 Fully Written In Nim - published over 2 years ago. Content: nimc2 is a very lightweight C2 written fully in nim (implant & server). If you want to give it a try check out the wiki to learn how to install and use nimc2. It's features include: Windows & Linux implant generation TCP socket communication (with HTTP communication coming soon) Ability to create as many listeners as you want A nice task syst... http://www.kitploit.com/2022/06/nimc2-c2-fully-written-in-nim.html Published: 2022 06 29 06:48:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Jwtear - Modular Command-Line Tool To Parse, Create And Manipulate JWT Tokens For Hackers - published over 2 years ago. Content: A modular command-line tool to parse, create and manipulate JSON Web Token(JWT) tokens for security testing purposes. Features Complete modularity. All commands are plugins. Easy to add new plugins. Support JWS and JWE tokens. Easy interface for plugins. (follow the template example) Flexible token generation based on production-class libra... http://www.kitploit.com/2022/06/jwtear-modular-command-line-tool-to.html Published: 2022 06 29 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Gallia - Extendable Pentesting Framework - published over 2 years ago. Content: Gallia is an extendable pentesting framework with the focus on the automotive domain. The scope of gallia is conducting penetration tests from a single ECU up to whole cars, with the main focus on the UDS interface. Taking advantage of this modular design, the logging and archiving functionality was developed separately. Acting as a generic interface, t... http://www.kitploit.com/2022/06/gallia-extendable-pentesting-framework.html Published: 2022 06 29 21:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
Article: SharpWSUS - CSharp tool for lateral movement through WSUS - published over 2 years ago. Content: SharpWSUS is a CSharp tool for lateral movement through WSUS. There is a corresponding blog (https://labs.nettitude.com/blog/introducing-sharpwsus/) which has more detailed information about the tooling, use case and detection. Credits Massive credit to the below resources that really did 90% of this for me. This tool is just an enhancement of the below ... http://www.kitploit.com/2022/06/sharpwsus-csharp-tool-for-lateral.html Published: 2022 06 30 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: awsEnum - Enumerate AWS Cloud Resources Based On Provided Credential - published over 2 years ago. Content: Enumrate AWS services! with no nosies awsEnum is a python script enumrate AWS services through the provided credential. ▄▄▄▄▄▄ ▄ ▄ ▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄ ▄▄ ▄ ▄▄ ▄▄ ▄▄ ▄▄ █ █ █ ▄ █ █ █ █ █ █ █ █ █ █ █▄█ ██ ▄ █ ██ ██ █ ▄▄▄▄▄█ ▄▄▄█ █▄█ █ █ █ █ ██ █▄█ █ █ █▄▄▄▄▄█ █▄▄▄█ █ █▄█ █ ██ █ ... http://www.kitploit.com/2022/07/awsenum-enumerate-aws-cloud-resources.html Published: 2022 07 01 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Dlinject - Inject A Shared Library (I.E. Arbitrary Code) Into A Live Linux Process, Without Ptrace - published over 2 years ago. Content: Inject a shared library (i.e. arbitrary code) into a live linux process, without ptrace. Inspired by Cexigua and linux-inject, among other things. Usage .___.__ .__ __ __ __| _/| | |__| ____ |__| ____ _____/ |_ ______ ___.__. / __ | | | | |/ \ | |/ __ \_/ ___\ __\ \____ < | |/ /_/ | | |_| | |... http://www.kitploit.com/2022/07/dlinject-inject-shared-library-ie.html Published: 2022 07 02 00:53:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
Article: Microsoft-365-Extractor-Suite - A Set Of PowerShell Scripts That Allow For Complete And Reliable Acquisition Of The Microsoft 365 Unified Audit Log - published over 2 years ago. Content: This suite of scripts contains two different scripts that can be used to acquire the Microsoft 365 Unified Audit Log Read the accompanying blog post on https://invictus-ir.medium.com/introduction-of-the-microsoft-365-extractor-suite-b85e148d4bfe Microsoft365_Extractor, the original script stems from the Office 365 Extractor and provides all featur... http://www.kitploit.com/2022/07/microsoft-365-extractor-suite-set-of.html Published: 2022 07 02 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: DeepTraffic - Deep Learning Models For Network Traffic Classification - published over 2 years ago. Content: For more information please read our papers. Wei Wang's Google Scholar Homepage Wei Wang, Xuewen Zeng, Xiaozhou Ye, Yiqiang Sheng and Ming Zhu,"Malware Traffic Classification Using Convolutional Neural Networks for Representation Learning," in the 31st International Conference on Information Networking (ICOIN 2017), pp. 712-717, 2017. Wei Wan... http://www.kitploit.com/2022/07/deeptraffic-deep-learning-models-for.html Published: 2022 07 02 21:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Aiodnsbrute - DNS Asynchronous Brute Force Utility - published over 2 years ago. Content: A Python 3.5+ tool that uses asyncio to brute force domain names asynchronously. Speed It's fast. Benchmarks on small VPS hosts put around 100k DNS resoultions at 1.5-2mins. An amazon M3 box was used to make 1 mil requests in just over 3 minutes. Your mileage may vary. It's probably best to avoid using Google's resolvers if you're purely interested in sp... http://www.kitploit.com/2022/07/aiodnsbrute-dns-asynchronous-brute.html Published: 2022 07 03 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
Article: Cspparse - A Tool To Evaluate Content Security Policies - published over 2 years ago. Content: cspparse is a tool to evaluate Content Security Policies. It uses Google's API to retrieve the CSP Headers and returns them in ReconJSON format. Not only does it check for headers with Google's API, it also parses the target site's HTML to look for any CSP rules that are specified in the <meta> tag Installation Install Command and Download Source W... http://www.kitploit.com/2022/07/cspparse-tool-to-evaluate-content.html Published: 2022 07 05 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: CrackQL - GraphQL Password Brute-Force And Fuzzing Utility - published over 2 years ago. Content: CrackQL is a GraphQL password brute-force and fuzzing utility. CrackQL is a versatile GraphQL penetration testing tool that exploits poor rate-limit and cost analysis controls to brute-force credentials and fuzz operations. How it works? CrackQL works by automatically batching a single GraphQL query or mutation into several alias operations. It determin... http://www.kitploit.com/2022/07/crackql-graphql-password-brute-force.html Published: 2022 07 07 00:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Haxx - Untethered + Unsandboxed Code Execution Haxx As Root On iOS 14 - iOS 14.8.1 - published over 2 years ago. Content: Untethered + Unsandboxed code execution haxx as root on iOS 14 - iOS 14.8.1. Based on CoreTrustDemo, also please note that certificates are not copyrightable. Usage Note: requires macOS + existing jailbreak Get up and running On your mac import dev_certificate.p12 into the keychain, and the password is password. Modify haxx.c to include your own co... http://www.kitploit.com/2022/07/haxx-untethered-unsandboxed-code.html Published: 2022 07 08 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
Article: Pamspy - Credentials Dumper For Linux Using eBPF - published over 2 years ago. Content: pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. It will track a particular userland function inside the PAM (Pluggable Authentication Modules) library, used by many critical applications to handle authentication like: sudo sshd passwd gnome x11 and many other ... How to launch? pamspy is built as a static binary wi... http://www.kitploit.com/2022/07/pamspy-credentials-dumper-for-linux.html Published: 2022 07 09 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Secretflow - A Unified Framework For Privacy-Preserving Data Analysis And Machine Learning - published over 2 years ago. Content: SecretFlow is a unified framework for privacy-preserving data intelligence and machine learning. To achieve this goal, it provides: An abstract device layer consists of plain devices and secret devices which encapsulate various cryptographic protocols. A device flow layer modeling higher algorithms as device object flow and DAG. An algorithm layer to... http://www.kitploit.com/2022/07/secretflow-unified-framework-for.html Published: 2022 07 10 21:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Tofu - Windows Offline Filesystem Hacking Tool For Linux - published over 2 years ago. Content: A modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors, user enumeration and more. How it works : When a Windows machine is shut down, unless it has Bitlocker or another encryption service enabled, it's storage device contains everything stored on the device as if it was unlocked. This means... http://www.kitploit.com/2022/07/tofu-windows-offline-filesystem-hacking.html Published: 2022 07 11 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
Article: WebView2-Cookie-Stealer - Attacking With WebView2 Applications - published over 2 years ago. Content: Please read this blog post to get more information. Source Code This code is a modified version of Microsoft's WebView2 Code. The current code can be cleaned up and made much better. Demo Launch Example Usage Example Usage Tested on Windows 10 & 11. When the binary is executed https://office.com/login is loaded up. A JavaScript keylogger is... http://www.kitploit.com/2022/07/webview2-cookie-stealer-attacking-with.html Published: 2022 07 12 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Bypass-Url-Parser - Tool That Tests Many URL Bypasses To Reach A 40X Protected Page - published over 2 years ago. Content: Tool that tests MANY url bypasses to reach a 40X protected page. If you wonder why this code is nothing but a dirty curl wrapper, here's why: Most of the python requests do url/path/parameter encoding/decoding, and I hate this. If I submit raw chars, I want raw chars to be sent. If I send a weird path, I want it weird, not normalized. This is surp... http://www.kitploit.com/2022/07/bypass-url-parser-tool-that-tests-many.html Published: 2022 07 13 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Trufflehog - Find Credentials All Over The Place - published over 2 years ago. Content: TruffleHog Find leaked credentials. Join The Slack Have questions? Feedback? Jump in slack and hang out with us https://join.slack.com/t/trufflehog-community/shared_invite/zt-pw2qbi43-Aa86hkiimstfdKH9UCpPzQ Demo docker run -it -v "$PWD:/pwd" trufflesecurity/trufflehog:latest github --org=trufflesecurity What's new in v3? TruffleHog v3 is a co... http://www.kitploit.com/2022/07/trufflehog-find-credentials-all-over.html Published: 2022 07 14 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
Article: Dumpscan - Tool To Extract And Dump Secrets From Kernel And Windows Minidump Formats - published over 2 years ago. Content: Dumpscan is a command-line tool designed to extract and dump secrets from kernel and Windows Minidump formats. Kernel-dump parsing is provided by volatility3. Features x509 Public and Private key (PKCS #8/PKCS #1) parsing SymCrypt parsing Supported structures SYMCRYPT_RSAKEY - Determines if the key structure also has a private key Matchin... http://www.kitploit.com/2022/07/dumpscan-tool-to-extract-and-dump.html Published: 2022 07 15 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Kubeaudit - Tool To Audit Your Kubernetes Clusters Against Common Security Controls - published over 2 years ago. Content: kubeaudit is a command line tool and a Go package to audit Kubernetes clusters for various different security concerns, such as: run as non-root use a read-only root filesystem drop scary capabilities, don't add new ones don't run privileged and more! tldr. kubeaudit makes sure you deploy secure containers! Package To use kubeaudit as a Go pac... http://www.kitploit.com/2022/07/kubeaudit-tool-to-audit-your-kubernetes.html Published: 2022 07 16 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Zenbuster - Multi-threaded URL Enumeration/Brute-Forcing Tool - published over 2 years ago. Content: ZenBuster is a multi-threaded, multi-platform URL enumeration tool written in Python by Zach Griffin (@0xTas). I wrote this tool as a way to deepen my familiarity with Python, and to help increase my understanding of Cybersecurity tooling in general. ZenBuster may not be the fastest or most comprehensive tool of its kind. It is however, simple to use, de... http://www.kitploit.com/2022/07/zenbuster-multi-threaded-url.html Published: 2022 07 17 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
Article: Koh - The Token Stealer - published over 2 years ago. Content: Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material via purposeful token/logon session leakage. Some code was inspired by Elad Shamir's Internal-Monologue project (no license), as well as KB180548. For why this is possible and Koh's approeach, see the Technical Background section of this README. For a de... http://www.kitploit.com/2022/07/koh-token-stealer.html Published: 2022 07 18 12:30:00 Received: 2022 08 08 21:50:41 Feed: PenTest and Hacking Tools - powered by FeedBurner Source: PenTest and Hacking Tools - powered by FeedBurner Category: News Topic: Security Tooling |
|
Article: Update: Colosseum Dental Benelux pays ransom to threat actors - published over 2 years ago. Content: https://www.databreaches.net/update-colosseum-dental-benelux-pays-ransom-to-threat-actors/ Published: 2022 08 08 21:02:53 Received: 2022 08 08 21:12:00 Feed: DataBreaches.net Source: DataBreaches.net Category: Data Breaches Topic: Data Breaches |
|
Article: Windows devices with newest CPUs are susceptible to data damage - published over 2 years ago. Content: https://www.bleepingcomputer.com/news/microsoft/windows-devices-with-newest-cpus-are-susceptible-to-data-damage/ Published: 2022 08 08 20:42:23 Received: 2022 08 08 21:02:12 Feed: Bleeping Computer - All News Feeds Source: Bleeping Computer Category: News Topic: Cyber Security |
Article: Ransomware, email compromise are top security threats, but deepfakes increase - published over 2 years ago. Content: https://www.csoonline.com/article/3669476/ransomware-email-compromise-are-top-security-threats-but-deepfakes-increase.html#tk.rss_all Published: 2022 08 08 17:05:00 Received: 2022 08 08 20:32:41 Feed: CSO Online - All Source: CSO Online Category: Cyber Security Topic: Cyber Security |
|
Article: Everything New in iOS 16 Beta 5: Battery Percentage in Status Bar, Find My Changes and More - published over 2 years ago. Content: https://www.macrumors.com/2022/08/08/ios-16-beta-5-features/ Published: 2022 08 08 19:53:13 Received: 2022 08 08 20:32:06 Feed: MacRumors : Mac News and Rumors Source: MacRumors : Mac News and Rumors Category: News Topic: Cyber Security |
|
Article: Researchers Uncover New Attempts by Qakbot Malware to Evade Detection - published over 2 years ago. Content: https://thehackernews.com/2022/07/researchers-uncover-new-attempts-by.html Published: 2022 07 13 06:04:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Researchers Uncover New Variants of the ChromeLoader Browser Hijacking Malware - published over 2 years ago. Content: https://thehackernews.com/2022/07/researchers-uncover-new-variants-of.html Published: 2022 07 13 08:51:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: 5 Questions You Need to Ask About Your Firewall Security - published over 2 years ago. Content: https://thehackernews.com/2022/07/5-questions-you-need-to-ask-about-your.html Published: 2022 07 13 10:23:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Microsoft Warns of Large-Scale AiTM Phishing Attacks Against Over 10,000 Organizations - published over 2 years ago. Content: https://thehackernews.com/2022/07/microsoft-warns-of-large-scale-aitm.html Published: 2022 07 13 10:26:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
Article: New UEFI Firmware Vulnerabilities Impact Several Lenovo Notebook Models - published over 2 years ago. Content: https://thehackernews.com/2022/07/new-uefi-firmware-vulnerabilities.html Published: 2022 07 13 11:47:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: U.S. FTC Vows to Crack Down on illegal Use and Sharing of Citizens' Sensitive Data - published over 2 years ago. Content: https://thehackernews.com/2022/07/us-ftc-vows-to-crack-down-on-illegal.html Published: 2022 07 13 11:55:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: New 'Retbleed' Speculative Execution Attack Affects AMD and Intel CPUs - published over 2 years ago. Content: https://thehackernews.com/2022/07/new-retbleed-speculative-execution.html Published: 2022 07 13 14:22:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Pakistani Hackers Targeting Indian Students in Latest Malware Campaign - published over 2 years ago. Content: https://thehackernews.com/2022/07/pakistani-hackers-targeting-indian.html Published: 2022 07 14 09:15:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Microsoft Details App Sandbox Escape Bug Impacting Apple iOS, iPadOS, macOS Devices - published over 2 years ago. Content: https://thehackernews.com/2022/07/microsoft-details-app-sandbox-escape.html Published: 2022 07 14 10:54:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: A Simple Formula for Getting Your IT Security Budget Approved - published over 2 years ago. Content: https://thehackernews.com/2022/07/a-simple-formula-for-getting-your-it.html Published: 2022 07 14 12:21:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
Article: State-Backed Hackers Targeting Journalists in Widespread Espionage Campaigns - published over 2 years ago. Content: https://thehackernews.com/2022/07/state-backed-hackers-targeting.html Published: 2022 07 14 12:29:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Former CIA Engineer Convicted of Leaking 'Vault 7' Hacking Secrets to WikiLeaks - published over 2 years ago. Content: https://thehackernews.com/2022/07/former-cia-engineer-convicted-of.html Published: 2022 07 14 15:06:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Mantis Botnet Behind the Largest HTTPS DDoS Attack Targeting Cloudflare Customers - published over 2 years ago. Content: https://thehackernews.com/2022/07/mantis-botnet-behind-largest-https-ddos.html Published: 2022 07 15 05:14:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
Article: North Korean Hackers Targeting Small and Midsize Businesses with H0lyGh0st Ransomware - published over 2 years ago. Content: https://thehackernews.com/2022/07/north-korean-hackers-targeting-small.html Published: 2022 07 15 10:22:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: New Cache Side Channel Attack Can De-Anonymize Targeted Online Users - published over 2 years ago. Content: https://thehackernews.com/2022/07/new-cache-side-channel-attack-can-de.html Published: 2022 07 15 14:53:00 Received: 2022 08 08 20:29:01 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: 5 Key Things We Learned from CISOs of Smaller Enterprises Survey - published over 2 years ago. Content: https://thehackernews.com/2022/07/5-key-things-we-learned-from-cisos-of.html Published: 2022 07 15 16:05:00 Received: 2022 08 08 20:29:00 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
Article: New Netwrix Auditor Bug Could Let Attackers Compromise Active Directory Domain - published over 2 years ago. Content: https://thehackernews.com/2022/07/new-netwrix-auditor-bug-could-let.html Published: 2022 07 16 05:07:00 Received: 2022 08 08 20:29:00 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Hackers Targeting VoIP Servers By Exploiting Digium Phone Software - published over 2 years ago. Content: https://thehackernews.com/2022/07/hackers-targeting-voip-servers-by.html Published: 2022 07 16 06:33:00 Received: 2022 08 08 20:29:00 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Google Removes "App Permissions" List from Play Store for New "Data Safety" Section - published over 2 years ago. Content: https://thehackernews.com/2022/07/google-removes-app-permissions-list.html Published: 2022 07 16 06:59:00 Received: 2022 08 08 20:29:00 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Juniper Releases Patches for Critical Flaws in Junos OS and Contrail Networking - published over 2 years ago. Content: https://thehackernews.com/2022/07/juniper-releases-patches-for-critical.html Published: 2022 07 18 05:02:00 Received: 2022 08 08 20:29:00 Feed: The Hacker News [ THN ] - Best Security Blog Source: The Hacker News [ THN ] - Best Security Blog Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor