Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified …
Top exploits used by ransomware gangs are VPN bugs, but RDP still reigns supreme
Suebsiri, Getty Images/iStockphoto Ransomware attacks targeting the enterprise sector have been at an all-time high in the first half of …
Pyre-Check – Performant Type-Checking For Python
Pyre is a performant type checker for Python compliant with PEP 484. Pyre can analyze codebases with millions of lines …
Scan-For-Webcams – Scan For Webcams In The Internet
Automatically scan for publically accessible webcams around the internet Usage The program will output a list of links with the …
FBI and CISA warn of major wave of vishing attacks targeting teleworkers
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint security advisory …
Free photos, graphics site Freepik discloses data breach impacting 8.3m users
Image: Freepik Company Freepik, a website dedicated to providing access to high-quality free photos and design graphics, has disclosed today …
SecGen – Create Randomly Insecure VMs
SecGen creates vulnerable virtual machines, lab environments, and hacking challenges, so students can learn security penetration testing techniques.Boxes like Metasploitable2 …
5 ways businesses can avoid phishing scams online
The concept of phishing is gaining immense popularity during the Covid-19 pandemic. People, by and large, are becoming victims of …
Online Cover Letter Writing Service in 2020: Pros & Cons
While a well-written one can improve your chances of being invited for an interview, a poorly-written paper can lead to …
University of Utah pays $457,000 to ransomware gang
Image via University of Utah; Composition: ZDNet The University of Utah revealed today that it paid a ransomware gang $457,059 …