A CTF web challenge about making screenshots. It is inspired by a bug found in real life. The challenge was …
Parents of teens who stole $1 million in Bitcoin sued by alleged victim
The parents of two teenagers allegedly responsible for stealing $1 million in Bitcoin are being sued. According to court documents …
BeaconEye – Hunts Out CobaltStrike Beacons And Logs Operator Command Output
BeaconEye scans running processes for active CobaltStrike beacons. When processes are found to be running beacon, BeaconEye will monitor each …
Proofpoint awarded $13.5 million in IP theft lawsuit against Vade Secure
Proofpoint has been awarded $13.5 million in damages from a former executive and their new employer over the theft of …
SLSA – Supply-chain Levels For Software Artifacts
SLSA (pronounced “salsa”) is security framework from source to service, giving anyone working with software a common language for increasing …
IBM launches new SASE service to bolster zero-trust enterprise security
IBM has announced a new Secure Access Service Edge (SASE) solution designed to encourage the zero-trust security approach in the …
DNSMonster – Passive DNS Capture/Monitoring Framework
Passive DNS collection and monitoring built with Golang, Clickhouse and Grafana: dnsmonster implements a packet sniffer for DNS traffic. It …
LazySign – Create Fake Certs For Binaries Using Windows Binaries And The Power Of Bat Files
Create fake certs for binaries using windows binaries and the power of bat files Over the years, several cool tools …
T-Mobile Acknowledges Breach of Customer Data, Launches Probe
In a statement dated August 16, 2021, T-mobile confirmed allegations that their servers had indeed been hacked. They insisted, however, …
Keimpx – Check For Valid Credentials Across A Network Over SMB
keimpx is an open source tool, released under the Apache License 2.0. It can be used to quickly check for …