Search and extract blob files on the Ethereum network using Etherscan.io API. Introduction EtherBlob Explorer is a tool intended for …
Android apps exposed data of millions of users through cloud authentication failures
Researchers analyzing Android apps have discovered serious cloud misconfigurations leading to the potential exposure of data belonging to over 100 …
Ghidra-Evm – Module For Reverse Engineering Smart Contracts
In the last few years, attacks on deployed smart contracts in the Ethereum blockchain have ended up in a significant …
Bizarro banking Trojan surges across Europe
The Bizarro banking Trojan has targeted customers of at least 70 banks as it moves from its Brazilian base to …
Does Avast Free Protect Against Ransomware in Your Mobile Device
Android is the primary operating system that is currently being used all over the world. As such, it has become …
Mediator – An Extensible, End-To-End Encrypted Reverse Shell With A Novel Approach To Its Architecture
Mediator is an end-to-end encrypted reverse shell in which the operator and the shell connect to a “mediator” server that …
Lemon Duck hacking group adopts Microsoft Exchange Server vulnerabilities in new attacks
Researchers have explored the latest activities of the Lemon Duck hacking group, including the leverage of Microsoft Exchange Server vulnerabilities …
Eyeballer – Convolutional Neural Network For Analyzing Pentest Screenshots
Eyeballer is meant for large-scope network penetration tests where you need to find “interesting” targets from a huge set of …
Fake Android, iOS apps promise lucrative investments while stealing your money
Researchers have discovered hundreds of malicious mobile apps that are exploiting interest in cryptocurrency and stocks to steal from victims. …
Red-Kube – Red Team K8S Adversary Emulation Based On Kubectl
Red Kube is a collection of kubectl commands written to evaluate the security posture of Kubernetes clusters from the attacker’s …