Image: Soviet Artefacts, ZDNet A Chinese-speaking hacking group has been observed using a UEFI bootkit to download and install additional …
New Ttint IoT botnet caught exploiting two zero-days in Tenda routers
Image via Tenda website For almost a year, a threat actor has been using zero-day vulnerabilities to install malware on …
AdvPhishing – This Is Advance Phishing Tool! OTP PHISHING
This Is Advance Phishing Tool! OTP PHISHING SPECIAL OTP BYPASS VIDEO WORKED TECHNIQUE When victim enter his credentials, you need …
Timewarrior – Commandline Time Reporting
Timewarrior is a time tracking utility that offers simple stopwatch features as well as sophisticated calendar-based backfill, along with flexible …
Google sets up research grant for finding bugs in browser JavaScript engines
Image: Markus Spiske Google has set up a research grant program to help and sponsor security researchers and academics find …
uriDeep – Unicode Encoding Attacks With Machine Learning
Unicode encoding attacks with machine learning. Tool based on machine learning to create amazing fake domains using confusables. Some domains …
Google is creating a special Android security team to find bugs in sensitive apps
Image: Mika Baumeister Google is hiring to create a special Android security team that will be tasked with finding vulnerabilities …
Powerglot – Encodes Offensive Powershell Scripts Using Polyglots
Powerglot encodes several kind of scripts using polyglots, for example, offensive powershell scripts. It is not needed a loader to …
US Treasury says some ransomware payments may need its express approval
The US Treasury Department has published guidelines today to be used in special circumstances where a ransomware payment may break US sanctions. …
North Korea has tried to hack 11 officials on the UN Security Council
Image: Llyass Seddoug Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and seriousness. …