Search
Monday 23 October 2017
  • :
  • :

Archives post

Imperva Incapsula’s Q2 Global DDoS Threat Landscape Report: The key findings

DDoS attacks still have the ability to strike fear into the hearts of security professionals and web server administrators everywhere. The...

macOS High Sierra Update Patches Keychain Access Flaw

An update released on Thursday by Apple for its macOS High Sierra operating system patches two vulnerabilities, including one that allows...

Germany Drops Probe Into Mass NSA Surveillance

Prosecutors in Germany on Thursday closed an investigation into whether US and British intelligence services systematically carried out...

kubebot: A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform

Kubebot A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform Architecture Demo Data Flow 1 – API...

NoSQLMap: Automated NoSQL database enumeration and web application exploitation tool

NoSQLMap NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default...

VHostScan: A virtual host scanner

VHostScan A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases, and dynamic default pages. First...

Advance-Nmap-Scan: armitage script

Advance-Nmap-Scan-with-Msf-Scan-Fixed Author : Nilotpal Biswas Facebook : https://www.facebook.com/nilotpal.biswas.73 Twitter...

SSH Penetration Testing (Port 22)

Probing through every open port is practically the first step hackers take in order to prepare their attack. And in order to work one is...

Dradis Framework – Collaboration and reporting for IT Security teams

Dradis is an open-source collaboration framework, tailored to InfoSec teams. Goals Share the information effectively. Easy to use, easy to...

FruityC2 – Post-Exploitation Tool to Manage Compromised Machines from a Web Interface

This is the initial release for FruityC2 (alpha version). Can be installed on any linux system, but the installation scripts are made for...

Vault 7 Leaks – inside the CIA secret kingdom (July-August 07)

Introduction Let’s continue to analyze the information contained in files leaked by the organization Wikileaks and allegedly originating...

CloudFlare Boots Off Torrent Site For Using Cryptocurrency Miner

CloudFlare says sites running mining code without notifying users are considered to be malware. In the last couple of weeks, researchers...

Hackers can identify if you are using sex toys and exploit them

Smart Sex Toys Can Be Switched On/Off and Exploited Remotely – Thanks To A Vulnerability. Pen Test Partners (PTP) is a security group...

Smartphones of NATO Soldiers Compromised By Russian Hackers

North Atlantic Treaty Organization, which is universally famous as NATO, has been targeted by none other but the country that is a pro at...

Israeli Firm Offering WiFi Interception Service to Law Enforcement Agencies

Israel has some most advanced surveillance tools industry and at the same time, it has most active, strong and somewhat notorious security...

Hackers of Russia Stole NSA’s Secrets using Kaspersky antivirus

The report may well be valid, but, for now, there’s no way to individually confirm it. The statement is based on unnamed personalities...

FormBook—Cheap Password Stealing Malware Used In Targeted Attacks

It seems sophisticated hackers have changed the way they conduct targeted cyber operations—instead of investing in zero-days and...

Greek Court Approves US Extradition of BTC-e Operator In $4 Billion Money Laundering Case

A Greek court has approved the U.S. extradition of a 38-year-old Russian national accused of laundering more than $4 billion in bitcoin for...

Experts discovered a SYSCON Backdoor using FTP Server as C&C

Security researchers with Trend Micro discovered a backdoor dubbed SYSCON that uses an FTP server for command and control (C&C)...

Russian firm provides North Korea with second Internet route

Dyn Research discovered traffic coming from North Korea running over the Russian TransTeleCom network, this is the second internet route of...

CVE-2017-12617 Code Execution flaw patched in Apache Tomcat

Several security vulnerabilities have been patched in recent weeks in Apache Tomcat, including the CVE-2017-12617 Code Execution...

CSE CybSec ZLAB Malware Analysis Report: APT28 Hospitality malware

The CSE CybSec Z-Lab Malware Lab analyzed the Hospitality malware used by the Russian APT28 group to target hotels in several European...

Ούτε ένας λογαριασμός Yahoo δεν “γλύτωσε” από το hack του 2013

                  Η Yahoo ανακοίνωσε πέρυσι επίσημα, ότι το 2013...

ESET: Οι millennials θα διαμορφώσουν ένα νέο τοπίο κυβερνοασφάλειας

                  Οι millennials βρίσκονται στο προσκήνιο των...

European Cyber Security Challenge 2017: Προετοιμάζοντας την Ελληνική ομάδα

H 10μελής Εθνική Ομάδα Κυβερνοασφάλειας είναι έτοιμη να εκπροσωπήσει την...

CYBERSEC Forum 2017 9-10 Οκτωβρίου 2017 στην Κρακοβία

CYBERSEC Forum 2017: Το CYBERSEC Forum είναι ένα από τα κορυφαία συνέδρια για την...

Οι πιο επικίνδυνες και ευάλωτες Android και iOS εφαρμογές

Android: Πρόσφατη έρευνα μας δίνει μια πιο προσεκτική ματιά στις εφαρμογές που...

Kaspersky: Σύνθετες επιθέσεις με το χαμηλότερο κόστος

Οι ερευνητές της Kaspersky Lab παρατηρούν μια νέα και μάλλον σημαντική τάση στο...

Η Yahoo προειδοποιεί: ποτέ μην επαναχρησιμοποιείτε παλιούς κωδικούς

Πολλές φορές, το να επαναχρησιμοποιούμε  παλιούς κωδικούς είναι μία εύκολη...