The official PHP Git server has been compromised in a potential attempt to plant malware in the code base of …
KICS – Find Security Vulnerabilities, Compliance Issues, And Infrastructure Misconfigurations Early In The Development Cycle Of Your Infrastructure-As-Code
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx. …
BadOutlook – (Kinda) Malicious Outlook Reader
A simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based on a …
University students refunded for false ads touting job opportunities with Microsoft, Twitter
The Federal Trade Commission (FTC) has sent millions of dollars in refunds to students affected by allegedly false University of …
Search-That-Hash – Searches Hash APIs To Crack Your Hash Quickly, If Hash Is Not Found Automatically Pipes Into HashCat
The Fastest Hash Cracking System pip3 install search-that-hash && sth Tired of going to every website to crack your hash? …
Cloudflare launches Page Shield to thwart Magecart card skimming attacks
Cloudflare has launched a new web security offering to prevent Magecart-style attacks. Magecart is an umbrella term used to describe …
Retoolkit – Reverse Engineer’s Toolkit
This is a collection of tools you may like if you are interested on reverse engineering and/or malware analysis on …
Hades ransomware operators are hunting big game in the US
An unknown threat group is deploying a variant of Hades in targeted attacks against US big game. On Friday, Accenture’s …
A Discussion on How to Prevent Ransomware Attacks
Is your PC shielded against ransomware assaults? Ransomware is a kind of malware (vindictive programming) which crooks use to extract …
Smogcloud – Find Cloud Assets That No One Wants Exposed
Find exposed AWS cloud assets that you did not know you had. A comprehensive asset inventory is step one to …