Dr.Semu runs executables in an isolated environment, monitors the behavior of a process, and based on Dr.Semu rules created by …
Israeli soldiers tricked into installing malware by Hamas agents posing as women
Image: IDF Members of the Hamas Palestinian militant group have posed as young teenage girls to lure Israeli soldiers into …
Manul – A Coverage-Guided Parallel Fuzzer For Open-Source And Blackbox Binaries On Windows, Linux And MacOS
Manul is a coverage-guided parallel fuzzer for open-source and black-box binaries on Windows, Linux and macOS (beta) written in pure …
IOTA cryptocurrency shuts down entire network after wallet hack
Image: Tinkersynth, ZDNet, IOTA Foundation IOTA Foundation, the nonprofit organization behind the IOTA cryptocurrency, has shut down its entire network …
Nray – Distributed Port Scanner
Nray is a free, platform and architecture independent port and application layer scanner. Apart from regular targets (list of hosts/networks), …
Bluetooth LE devices impacted by SweynTooth vulnerabilities
A team of academics from Singapore has published this week a research paper detailing a collection of vulnerabilities named SweynTooth …
UK police deny responsibility for poster urging parents to report kids for using Kali Linux
The UK’s National Crime Agency (NCA) has publicly said it has nothing to do with a misleading poster designed to …
CTFTOOL – Interactive CTF Exploration Tool
An Interactive CTF Exploration ToolThis is ctftool, an interactive command line tool to experiment with CTF, a little-known protocol used …
Learning About Secure Regression Testing with Examples Included
Why do Developers Need Regression Testing? Developing software without the step of regression test implementation can cause several problems to …
Critical XSS vulnerability patched in WordPress plugin GDPR Cookie Consent
Critical security issues caused by improper access controls in a WordPress plugin designed for GDPR cookie compliance have been resolved, …