Google is ramping up its campaign against HTTP only sites and is going to mark ALL Non-HTTPS sites insecure in …
altdns – Subdomain Recon Tool With Permutation Generation
Altdns is a Subdomain Recon Tool in Python that allows for the discovery of subdomains that conform to patterns. The …
0-Day Flash Vulnerability Exploited In The Wild
So another 0-Day Flash Vulnerability is being exploited in the Wild, a previously unknown flaw which has been labelled CVE-2018-4878 …
dorkbot – Command-Line Tool For Google Dorking
usage: dorkbot.py [–h] [–c CONFIG] [–b BLACKLIST] [–d DATABASE] [–i INDEXER] [–l] [–o INDEXER_OPTIONS] [–p SCANNER_OPTIONS] [–s SCANNER] [–v VULNDIR] …
Researchers discover Malware Samples Designed to Exploit CPU Vulnerabilities
As of late scientists have found more than 130 malware samples intended to misuse the recently disclosed Spectre and Meltdown …
UK Government to Fine Infrastructure Organisations up to £17m for Lax Cybersecurity
Industries running critical infrastructure in the UK will be facing fines as much as £17 million ($24 million), if they …
The Team8 Portfolio Company, comes Out of Stealth and launches its First Product upon a Disruptive Hybrid Architecture
The Israeli cyber security company Hysolate founded by President Tal Zamir, a veteran of an elite Israeli cyber unit and …
Japan cryptocurrency exchange to refund stolen assets worth $400m
Coincheck, one of Japan’s major cryptocurrency exchange, has promised to refund to its customers about $423m (£282m) stolen by hackers …
OnePlus denies accusation of sending Clipboard data to China
OnePlus had been accused of sending Clipboard data taken from OnePlus phones in the latest OxygenOS Beta version to China …
Russia-linked hackers Fancy Bears leak data from International Luge Federation
A Russia-linked hacker group called “Fancy Bears” released a statement on Wednesday claiming to have leaked emails and documents that …