At least one major ransomware gang is abusing vulnerabilities in the VMWare ESXi product to take over virtual machines deployed …
Flawfinder – A Static Analysis Tool For Finding Vulnerabilities In C/C++ Source Code
This is “flawfinder” by David A. Wheeler. Flawfinder is a simple program that scans C/C++ source code and reports potential …
MOSE – Post Exploitation Tool For Configuration Management Servers.
MOSE is a post exploitation tool that enables security professionals with little or no experience with configuration management (CM) technologies …
Electronic health records provider Athena to pay $18m settlement in kickback lawsuit
Electronic health records (EHR) provider Athena has agreed to pay $18.25 million to settle claims the company was involved in …
PSC – E2E Encryption For Multi-Hop Tty Sessions Or Portshells + TCP/UDP Port Forward
DNS lookup and SSH session forwarded across an UART connection to a Pi PSC allows to e2e encrypt shell sessions, …
Google deploys Chrome mitigations against new NAT Slipstreaming attack
Image: Samy Kamkar Google has blocked eight additional ports inside the Chrome web browser in order to prevent a new …
FonixCrypter ransomware gang releases master decryption key
Image: ZDNet The cybercrime group behind the FonixCrypter ransomware has announced today on Twitter that they’ve deleted the ransomware’s source …
CSSG – Cobalt Strike Shellcode Generator
Adds Shellcode – Shellcode Generator to the Cobalt Strike top menu bar CSSG is an aggressor and python script used …
Google bans another misbehaving CA from Chrome
Getty Images/iStockphoto Google intends to ban and remove support from Chrome for digital certificates issued by Spanish certificate authority (CA) Camerfirma, …
JWT Key ID Injector – Simple Python Script To Check Against Hypothetical JWT Vulnerability
Simple python script to check against hypothetical JWT vulnerability. Let’s say there is an application that uses JWT tokens signed …