Small utility program to perform multiple operations for a given subnet/CIDR ranges. The tool was developed to ease load distribution …
Microsoft: Some ransomware attacks take less than 45 minutes
Image: Microsoft For many years, the Microsoft Security Intelligence Report has been the gold standard in terms of providing a …
Polypyus – Learns To Locate Functions In Raw Binaries By Extracting Known Functions From Similar Binaries
Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware …
UHS hospital network hit by ransomware attack
Universal Health Services (UHS), a Fortune 500 company and one of the largest healthcare providers in the US, has been …
Cooolis-ms – A Server That Supports The Metasploit Framework RPC
Cooolis-ms is a server that supports Metasploit Framework RPC. It is used to work for Shellcode and PE loader, bypassing …
Wacker – A WPA3 Dictionary Cracker
A set of scripts to help perform an online dictionary attack against a WPA3 access point. Wacker leverages the wpa_supplicant …
Google removes 17 Android apps doing WAP billing fraud from the Play Store
Image: Zscaler special feature Securing Your Mobile Enterprise Mobile devices continue their march toward becoming powerful productivity machines. But they …
Velociraptor – Endpoint Visibility and Collection Tool
Velociraptor is a tool for collecting host based state information using Velocidex Query Language (VQL) queries. To learn more about …
KuCoin cryptocurrency exchange hacked for $150 million
Singapore-based cryptocurrency exchange KuCoin disclosed today a mega hack. In a statement posted on its website, the company confirmed that a threat …
Twitter warns of possible API keys leak
Image: Kon Karampelas Twitter is notifying developers today about a possible security incident that may have impacted their accounts. The …