Adobe has patched numerous critical vulnerabilities in a range of software including Magento, Acrobat, Reader, and Photoshop. On Tuesday, the …
ATTPwn – Tool Designed To Emulate Adversaries
ATTPwn is a computer security tool designed to emulate adversaries. The tool aims to bring emulation of a real threat …
CD Projekt Red game studio discloses ransomware attack, extortion attempt
Image: CD Projekt Red Polish game developer CD Projekt Red, the maker of triple-A games like Cyberpunk 2077 and The …
Ditto – A Tool For IDN Homograph Attacks And Detection
Ditto is a small tool that accepts a domain name as input and generates all its variants for an homograph …
Hacktivists deface multiple Sri Lankan domains, including Google.lk
A mysterious group of hacktivists has poisoned the DNS records of several Sri Lankans (.lk) websites on Saturday and redirected …
ExecuteAssembly – Load/Inject .NET Assemblies
ExecuteAssembly is an alternative of CS execute-assembly, built with C/C++ and it can be used to Load/Inject .NET assemblies by; …
Google Chrome sync feature can be abused for C&C and data exfiltration
Image: Catalin Cimpanu Threat actors have discovered they can abuse the Google Chrome sync feature to send commands to infected …
Webdev tutorials site SitePoint discloses data breach
Image: SitePoint, ZDNet, Florian Olivo SitePoint, a website that provides access to a wealth of web development tutorials and books, …
Cloudlist – A Tool For Listing Assets From Multiple Cloud Providers
Cloudlist is a multi-cloud tool for getting Assets (Hostnames, IP Addresses) from Cloud Providers. This is intended to be used …
Plex Media servers are being abused for DDoS attacks
Image: Citrix DDoS-for-hire services have found a way to abuse Plex Media servers to bounce junk traffic and amplify distributed …