auspex [ˈau̯s.pɛks] noun: An augur of ancient Rome, especially one who interpreted omens derived from the observation of birds. awspx …
FBI re-sends alert about supply chain attacks for the third time in three months
The FBI has issued an alert on Monday about state-sponsored hackers using the Kwampirs malware to attack supply chain companies …
CVE-2020-0796 – Windows SMBv3 LPE Exploit #SMBGhost
Windows SMBv3 LPE Exploit Authors References Source : KitPloit – PenTest Tools!
RDP and VPN use skyrocketed since coronavirus onset
Image: Shodan The use of remote access technologies like RDP (Remote Desktop Protocol) and VPN (Virtual Private Network) has skyrocketed …
Project iKy v2.4.0 – Tool That Collects Information From An Email And Shows Results In A Nice Visual Interface
Project iKy is a tool that collects information from an email and shows results in a nice visual interface. Visit …
Source code of Dharma ransomware pops up for sale on hacking forums
Image: ZDNet The source code of a major ransomware strain named Dharma has been put up for sale on two …
Webkiller v2.0 – Tool Information Gathering
Tool Information Gathering Write With Python. PreView ██╗ ██╗███████╗██████╗ ██╗ ██╗██╗██╗ ██╗ ███████╗██████╗ ██║ ██║██╔════╝██╔══██╗██║ ██╔╝██║██║ ██║ ██╔════╝██╔══██╗ ██║ █╗ …
A mysterious hacker group is eavesdropping on corporate email and FTP traffic
Image: DrayTek, ZDNet Since at least early December 2019, a mysterious hacker group has been taking over DrayTek enterprise routers …
Mssqlproxy – A Toolkit Aimed To Perform Lateral Movement In Restricted Environments Through A Compromised Microsoft SQL Server Via Socket Reuse
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket …
3 Ways Role-Based Access Control can Help Organizations
With the growing cyber threats and data leaks, every organization must follow the industry-recommended security practices and opt for the …