The FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint advisory in the aftermath of …
Baserunner – A Tool For Exploring Firebase Datastores
A tool for exploring and exploiting Firebase datastores. Set up git clone https://github.com/iosiro/baserunner.git cd baserunner npm install npm run build …
DarkSide explained: the ransomware group responsible for Colonial Pipeline cyberattack
When speaking to a cybersecurity expert concerning the Microsoft Exchange Server vulnerabilities several months ago and its impact on thousands …
CyberBattleSim – An Experimentation And Research Platform To Investigate The Interaction Of Automated Agents In An Abstract Simulated Network Environments
CyberBattleSim is an experimentation research platform to investigate the interaction of automated agents operating in a simulated abstract enterprise network …
Amazon seized, destroyed two million fake products sent to warehouses in 2020
Amazon’s crusade against counterfeit product sellers on the firm’s platform continues with two million products seized and destroyed in 2020. …
Waybackurls – Fetch All The URLs That The Wayback Machine Knows About For A Domain
Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for *.domain and output them on stdout. Usage …
Google teams up with Stop Scams to tackle financial fraud in the UK
Google has joined Stop Scams and outlined new measures to try and clamp down on financial fraud in the United …
Red-Detector – Scan Your EC2 Instance To Find Its Vulnerabilities Using Vuls.io
Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/). Audit your EC2 instance to find security misconfigurations using …
IRS secures order to serve Kraken with customer data request on cryptocurrency traders
The Internal Revenue Service (IRS) has secured an order to obtain records from Kraken on customers performing cryptocurrency trades. In …
CANalyse – A Vehicle Network Analysis And Attack Tool
CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect …