Introducing TScopy It is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on …
OverRide – Binary Exploitation And Reverse-Engineering (From Assembly Into C)
Explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you will find: flag …
Zero-day vulnerabilities in SonicWall email security are being actively exploited
SonicWall is urging customers to apply patches to resolve three zero-day vulnerabilities in its email security solution that are being …
IPCDump – Tool For Tracing Interprocess Communication (IPC) On Linux
Announcement post ipcdump is a tool for tracing interprocess communication (IPC) on Linux. It covers most of the common IPC …
SolarWinds hack analysis reveals 56% boost in command server footprint
A new analysis of the SolarWinds breach suggests that the attacker infrastructure behind the campaign is far larger than first …
ToxicEye: Trojan abuses Telegram platform to steal your data
Operators of a new Remote Access Trojan (RAT) are exploiting the Telegram service to maintain control of their malware. Dubbed …
Vulnerablecode – A Free And Open Vulnerabilities Database And The Packages They Impact And The Tools To Aggregate And Correlate These Vulnerabilities
VulnerableCode is a free and open database of FOSS software package vulnerabilities and the tools to create and keep the …
New US Justice Department team aims to disrupt ransomware operations
The US Department of Justice (DoJ) is forming a new task force to deal with the “root causes” of ransomware. …
Dnspeep – Spy On The DNS Queries Your Computer Is Making
dnspeep lets you spy on the DNS queries your computer is making. Here’s some example output: $ sudo dnspeepquery name …
3 Companies that Help SMBs to Improve Their Cybersecurity
The Covid-19 pandemic has created new challenges for entrepreneurs as they adapt functional models where working from home has become …