QBot Trojan operators are using new tactics to hijack legitimate, emailed conversations in order to steal credentials and financial data. …
Hack-Tools – The All-In-One Red Team Extension For Web Pentester
The all-in-one Red Team browser extension for Web PentestersHackTools, is a web extension facilitating your web application penetration tests, it …
Mercenary hacker group targets companies with 3Ds Max malware
Security firm Bitdefender said it discovered what appears to be a new hacker group that is currently targeting companies across …
VolExp – Volatility Explorer
This program allows the user to access a Memory Dump. It can also function as a plugin to the Volatility …
Lazarus group strikes cryptocurrency firm through LinkedIn job adverts
The Lazarus group is on the hunt for cryptocurrency once more and has now launched a targeted attack against a …
Yeti – Your Everyday Threat Intelligence
Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified …
Top exploits used by ransomware gangs are VPN bugs, but RDP still reigns supreme
Suebsiri, Getty Images/iStockphoto Ransomware attacks targeting the enterprise sector have been at an all-time high in the first half of …
Pyre-Check – Performant Type-Checking For Python
Pyre is a performant type checker for Python compliant with PEP 484. Pyre can analyze codebases with millions of lines …
Scan-For-Webcams – Scan For Webcams In The Internet
Automatically scan for publically accessible webcams around the internet Usage The program will output a list of links with the …
FBI and CISA warn of major wave of vishing attacks targeting teleworkers
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint security advisory …