Ransomware is a type of malware that involves encrypting a company’s or individual’s useful data or blocking users from accessing …
FTC joins 38 states in takedown of massive charity robocall operation
The US Federal Trade Commission (FTC) has closed down a huge charity fundraising scam that duped victims out of $110 …
CertEagle – Asset monitoring utility using real time CT log feeds
In Bugbounties “If you are not first , then you are last” there is no such thing as silver or …
Accellion zero-day claims a new victim in cybersecurity company Qualys
Qualys has revealed that a “limited” number of customers may have been impacted by a data breach connected to an …
SharpSphere – .NET Project For Attacking vCenter
SharpSphere gives red teamers the ability to easily interact with the guest operating systems of virtual machines managed by vCenter. …
Ursnif Trojan has targeted over 100 Italian banks
The Ursnif Trojan has been traced back to attacks against at least 100 banks in Italy. According to Avast, the …
Threatspec – Continuous Threat Modeling, Through Code
Threatspec is an open source project that aims to close the gap between development and security by bringing the threat …
ObliqueRAT Trojan now lurks in images on compromised websites
Cyberattackers behind ObliqueRAT campaigns are now disguising the Trojan in benign image files on hijacked websites. The ObliqueRAT Remote Access …
OWASP ASST (Automated Software Security Toolkit) – A Novel Open Source Web Security Scanner
OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security Scanner. Note: AWSS is the older name …
Hackers exploit websites to give them excellent SEO before deploying malware
Cyberattackers have turned to search engine optimization (SEO) techniques to deploy malware payloads to as many victims as possible. ZDNet …