Image: Tinkersynth, ZDNet, IOTA Foundation IOTA Foundation, the nonprofit organization behind the IOTA cryptocurrency, has shut down its entire network …
Nray – Distributed Port Scanner
Nray is a free, platform and architecture independent port and application layer scanner. Apart from regular targets (list of hosts/networks), …
Bluetooth LE devices impacted by SweynTooth vulnerabilities
A team of academics from Singapore has published this week a research paper detailing a collection of vulnerabilities named SweynTooth …
UK police deny responsibility for poster urging parents to report kids for using Kali Linux
The UK’s National Crime Agency (NCA) has publicly said it has nothing to do with a misleading poster designed to …
CTFTOOL – Interactive CTF Exploration Tool
An Interactive CTF Exploration ToolThis is ctftool, an interactive command line tool to experiment with CTF, a little-known protocol used …
Learning About Secure Regression Testing with Examples Included
Why do Developers Need Regression Testing? Developing software without the step of regression test implementation can cause several problems to …
Critical XSS vulnerability patched in WordPress plugin GDPR Cookie Consent
Critical security issues caused by improper access controls in a WordPress plugin designed for GDPR cookie compliance have been resolved, …
OpenRelayMagic – Tool To Find SMTP Servers Vulnerable To Open Relay
╔═╗┌─┐┌─┐┌┐┌╦═╗┌─┐┬ ┌─┐┬ ┬╔╦╗┌─┐┌─┐┬┌─┐ ║ ║├─┘├┤ │││╠╦╝├┤ │ ├─┤└┬┘║║║├─┤│ ┬││ ╚═╝┴ └─┘┘└┘╩╚═└─┘┴─┘┴ ┴ ┴ ╩ ╩┴ ┴└─┘┴└─┘ Tool to test for …
Apple joins FIDO Alliance, commits to getting rid of passwords
We all use passwords. We also all suck at using them. 81% of all hacking-based security breaches can be traced …
KawaiiDeauther – Jam All Wifi Clients/Routers
Kawaii Deauther is a pentest toolkit whose goal is to perform jam on WiFi clients/routers and spam many fake AP …