Chainalysis has launched a program designed to manage and store cryptocurrency seized during criminal investigations. Announced on Thursday, the blockchain …
Herpaderping – Process Herpaderping Bypasses Security Products By Obscuring The Intentions Of A Process
Process Herpaderping is a method of obscuring the intentions of a process by modifying the content on disk after the …
Microsoft says three APTs have targeted seven COVID-19 vaccine makers
Image: Emin Baycan Microsoft says it detected three state-sponsored hacking operations (also known as APTs) that have launched cyber-attacks on at …
Tfsec – Security Scanner For Your Terraform Code
tfsec uses static analysis of your terraform templates to spot potential security issues. Now with terraform v0.12+ support. Example Output …
Hacker steals $2 million from cryptocurrency service Akropolis
Cryptocurrency borrowing and lending service Akropolis says a hacker used a “flash loan” attack against its platform and stole roughly …
Info of 27.7 million Texas drivers exposed in Vertafore data breach
Image: Gabriel Gurrola Vertafore, a provider of insurance software, has disclosed this week a data breach, admitting that a third-party …
FAMA – Forensic Analysis For Mobile Apps
LabCIF – Forensic Analysis for Mobile Apps Getting Started Android extraction and analysis framework with an integrated Autopsy Module. Dump …
Microsoft urges users to stop using phone-based multi-factor authentication
Microsoft is urging users to abandon telephone-based multi-factor authentication (MFA) solutions like one-time codes sent via SMS and voice calls …
Octopus WAF – Web Application Firewall Made In C Language And Use Libevent
OctopusWAF is a open source Web application firewall, is made in C language uses libevent to make multiple connections. First …
Facebook link preview feature used as a proxy in website-scraping scheme
Image: Facebook Multiple data-scraping groups have abused the Facebook link preview feature to scrape data from internet sites disguised as …