PatrOwl provides scalable, free and open-source solutions for orchestrating Security Operations and providing Threat Intelligence feeds. PatrowlHears is an advanced …
Android spyware strains linked to state-sponsored Confucius threat group
Two variants of Android spyware connected to pro-India, state-sponsored hacking campaigns have been discovered. On Tuesday, cybersecurity firm Lookout said …
ShellShockHunter – It’s A Simple Tool For Test Vulnerability Shellshock
It’s a simple tool for test vulnerability shellshock Autor: MrCl0wnBlog: http://blog.mrcl0wn.comGitHub: https://github.com/MrCl0wnLabTwitter: https://twitter.com/MrCl0wnLabEmail: mrcl0wnlab\@\gmail.com Shellshock (software bug) Shellshock, also known …
Adobe patches wave of critical bugs in Magento, Acrobat, Reader
Adobe has patched numerous critical vulnerabilities in a range of software including Magento, Acrobat, Reader, and Photoshop. On Tuesday, the …
ATTPwn – Tool Designed To Emulate Adversaries
ATTPwn is a computer security tool designed to emulate adversaries. The tool aims to bring emulation of a real threat …
CD Projekt Red game studio discloses ransomware attack, extortion attempt
Image: CD Projekt Red Polish game developer CD Projekt Red, the maker of triple-A games like Cyberpunk 2077 and The …
Ditto – A Tool For IDN Homograph Attacks And Detection
Ditto is a small tool that accepts a domain name as input and generates all its variants for an homograph …
Hacktivists deface multiple Sri Lankan domains, including Google.lk
A mysterious group of hacktivists has poisoned the DNS records of several Sri Lankans (.lk) websites on Saturday and redirected …
ExecuteAssembly – Load/Inject .NET Assemblies
ExecuteAssembly is an alternative of CS execute-assembly, built with C/C++ and it can be used to Load/Inject .NET assemblies by; …
Google Chrome sync feature can be abused for C&C and data exfiltration
Image: Catalin Cimpanu Threat actors have discovered they can abuse the Google Chrome sync feature to send commands to infected …