Researchers have discovered hundreds of malicious mobile apps that are exploiting interest in cryptocurrency and stocks to steal from victims. …
Red-Kube – Red Team K8S Adversary Emulation Based On Kubectl
Red Kube is a collection of kubectl commands written to evaluate the security posture of Kubernetes clusters from the attacker’s …
HelpSystems expands email, cloud security portfolio with acquisition of Agari, Beyond Security
HelpSystems has announced the acquisition of Agari and Beyond Security as the firm continues to expand its cybersecurity portfolio. The …
Mubeng – An Incredibly Fast Proxy Checker And IP Rotator With Ease
An incredibly fast proxy checker & IP rotator with ease. Features Proxy IP rotator: Rotates your IP address for every …
Rapid7 source code, alert data accessed in Codecov supply chain attack
Rapid7 has disclosed the compromise of customer data and partial source code due to the Codecov supply chain attack. On …
R77-Rootkit – Fileless Ring 3 Rootkit With Installer And Persistence That Hides Processes, Files, Network Connections, Etc…
Ring 3 rootkit r77 is a ring 3 Rootkit that hides following entities from all processes: Files, directories, junctions, named …
Toshiba unit struck by DarkSide ransomware group
A Toshiba unit has become the latest victim of a DarkSide ransomware attack. more coverage On Friday, Toshiba Tec Corp …
Colonial Pipeline paid close to $5 million in ransomware blackmail payment
Colonial Pipeline reportedly paid the ransomware group responsible for a cyberattack last week close to $5 million to decrypt locked …
Snuffleupagus – Security Module For Php7 And Php8 – Killing Bugclasses And Virtual-Patching The Rest!
Security module for php7 and php8 – Killing bugclasses and virtual-patching the rest! Snuffleupagus is a PHP 7+ and 8+ …
APSoft-Web-Scanner-v2 – Powerful Dork Searcher And Vulnerability Scanner For Windows Platform
APSoft Webscanner Version 2 new version of APSoft Webscanner Version 1 Software pictures What can i do with this ? …