Image: NASA Multiple security researchers and research teams have published over the weekend lists ranging from 100 to 280 organizations …
Byp4Xx – Simple Bash Script To Bypass “403 Forbidden” Messages With Well-Known Methods Discussed In #Bugbountytips
byp4xx.sh __ __ __ / /_ __ ______ / // / _ ___ __/ __ \/ / / / __ …
Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways
Image: Zyxel More than 100,000 Zyxel firewalls, VPN gateways, and access point controllers contain a hardcoded admin-level backdoor account that …
Oblivion – Data Leak Checker And OSINT Tool
Oblivion is a tool focused in real time monitoring of new data leaks, notifying if the credentials of the user …
FBI: Swatters are hijacking smart devices to live-stream swatting incidents
Image via matthrono (Flickr/CC2.0) The US Federal Bureau of Investigation says criminals are hijacking weakly-secured smart devices in order to …
SolarWinds hackers accessed Microsoft source code
Image: ZDNet The hackers behind the SolarWinds supply chain attack managed to escalate access inside Microsoft’s internal network and gain …
Vulmap – Web Vulnerability Scanning And Verification Tools
Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS …
CISA updates SolarWinds guidance, tells US govt agencies to update right away
Image: SolarWinds, ZDNet The US Cybersecurity and Infrastructure Security Agency has updated its official guidance for dealing with the fallout …
ApkLeaks – Scanning APK File For URIs, Endpoints And Secrets
Scanning APK file for URIs, endpoints & secrets. Installation To install apkLeaks, simply: $ git clone https://github.com/dwisiswant0/apkleaks$ cd apkleaks/$ pip …
Vietnam targeted in complex supply chain attack
Image: T.H. Chia A group of mysterious hackers has carried out a clever supply chain attack against Vietnamese private companies …