When speaking to a cybersecurity expert concerning the Microsoft Exchange Server vulnerabilities several months ago and its impact on thousands …
CyberBattleSim – An Experimentation And Research Platform To Investigate The Interaction Of Automated Agents In An Abstract Simulated Network Environments
CyberBattleSim is an experimentation research platform to investigate the interaction of automated agents operating in a simulated abstract enterprise network …
Amazon seized, destroyed two million fake products sent to warehouses in 2020
Amazon’s crusade against counterfeit product sellers on the firm’s platform continues with two million products seized and destroyed in 2020. …
Waybackurls – Fetch All The URLs That The Wayback Machine Knows About For A Domain
Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for *.domain and output them on stdout. Usage …
Google teams up with Stop Scams to tackle financial fraud in the UK
Google has joined Stop Scams and outlined new measures to try and clamp down on financial fraud in the United …
Red-Detector – Scan Your EC2 Instance To Find Its Vulnerabilities Using Vuls.io
Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/). Audit your EC2 instance to find security misconfigurations using …
IRS secures order to serve Kraken with customer data request on cryptocurrency traders
The Internal Revenue Service (IRS) has secured an order to obtain records from Kraken on customers performing cryptocurrency trades. In …
CANalyse – A Vehicle Network Analysis And Attack Tool
CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect …
New Moriya rootkit stealthily backdoors Windows systems
Unknown threat actors have been employing a Windows rootkit for years to stealthily install backdoors on vulnerable machines. In a …
Priv2Admin – Exploitation Paths Allowing You To (Mis)Use The Windows Privileges To Elevate Your Rights Within The OS
The idea is to “translate” Windows OS privileges to a path leading to: administrator, integrity and/or confidentiality threat, availability threat, …