Qualys has revealed that a “limited” number of customers may have been impacted by a data breach connected to an …

Qualys has revealed that a “limited” number of customers may have been impacted by a data breach connected to an …
SharpSphere gives red teamers the ability to easily interact with the guest operating systems of virtual machines managed by vCenter. …
The Ursnif Trojan has been traced back to attacks against at least 100 banks in Italy. According to Avast, the …
Threatspec is an open source project that aims to close the gap between development and security by bringing the threat …
Cyberattackers behind ObliqueRAT campaigns are now disguising the Trojan in benign image files on hijacked websites. The ObliqueRAT Remote Access …
OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security Scanner. Note: AWSS is the older name …
Cyberattackers have turned to search engine optimization (SEO) techniques to deploy malware payloads to as many victims as possible. ZDNet …
StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution …
How to Make Ransomware? Ransomware is a type of malware that operates by either locking you out of your computer …
A Forensic Evidence Acquirer Compile Assuming you have Rust 1.41+ installed. Open terminal in the project directory and to compile …