A fast tool to check missing hosted DNS zones that can lead to subdomain takeover. What is a DNS takeover? …
New Go malware Capoae targets WordPress installs, Linux systems
A new strain of malware, written in Go, has been spotted in cyberattacks launched against WordPress and Linux systems. On …
Google Releases more Updated Features for Workspace to Facilitate Hybrid Work
Google recently released various new updated features targeting its collaboration and productivity platform, Workspace. The features will help eliminate existing …
Kali Linux 2021.3 – Penetration Testing and Ethical Hacking Linux Distribution
Time for another Kali Linux release! – Kali Linux 2021.1. This release has various impressive updates. A summary of the …
Cybercriminals recreate Cobalt Strike in Linux
A re-implementation of Cobalt Strike has been “written from scratch” to attack Linux systems. Dubbed Vermilion Strike, Intezer said on …
BoobSnail – Allows Generating Excel 4.0 XLM Macro
BoobSnail allows generating XLM (Excel 4.0) macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation. …
HP patches severe OMEN driver privilege escalation vulnerability
A high-impact vulnerability in OMEN Command Center driver software has been patched by HP. On Tuesday, researchers from SentinelLabs published …
Peirates – Kubernetes Penetration Testing Tool
What is Peirates? Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. …
This is how a cybersecurity researcher accidentally broke Apple Shortcuts
A Detectify researcher has explained how an investigation into Apple CloudKit led to the accidental downtime of Shortcuts functionality for …
Autoharness – A Tool That Automatically Creates Fuzzing Harnesses Based On A Library
AutoHarness is a tool that automatically generates fuzzing harnesses for you. This idea stems from a concurrent problem in fuzzing …