A mysterious group of hacktivists has poisoned the DNS records of several Sri Lankans (.lk) websites on Saturday and redirected …
ExecuteAssembly – Load/Inject .NET Assemblies
ExecuteAssembly is an alternative of CS execute-assembly, built with C/C++ and it can be used to Load/Inject .NET assemblies by; …
Google Chrome sync feature can be abused for C&C and data exfiltration
Image: Catalin Cimpanu Threat actors have discovered they can abuse the Google Chrome sync feature to send commands to infected …
Webdev tutorials site SitePoint discloses data breach
Image: SitePoint, ZDNet, Florian Olivo SitePoint, a website that provides access to a wealth of web development tutorials and books, …
Cloudlist – A Tool For Listing Assets From Multiple Cloud Providers
Cloudlist is a multi-cloud tool for getting Assets (Hostnames, IP Addresses) from Cloud Providers. This is intended to be used …
Plex Media servers are being abused for DDoS attacks
Image: Citrix DDoS-for-hire services have found a way to abuse Plex Media servers to bounce junk traffic and amplify distributed …
Satellite – Easy-To-Use Payload Hosting
Satellite is an web payload hosting service which filters requests to ensure the correct target is getting a payload. This …
Android devices ensnared in DDoS botnet
Netlab, the networking security division of Chinese security firm Qihoo 360, said it discovered this week a new fledgling malware …
Linux-Chrome-Recon – An Information Gathering Tool Used To Enumerate All Possible Data About An User From Google-Chrome Browser From Any Linux Distribution
“linux-chrome-recon” is a Information gathering tool used to enumerate all possible data about an user from Google-Chrome browser from any …
Mozilla expected to launch its VPN service in Germany and France in Q1 2021
Image: Mozilla, ZDNet, Jason Leung Mozilla is expected to expand its virtual private network (VPN) offering in Germany and France …