Image: LG, Simone Hutsch, ZDNet The operators of the Maze ransomware have published today tens of GB of internal data …
Cnitch – Container Snitch Checks Running Processes Under The Docker Engine And Alerts If Any Are Found To Be Running As Root
cnitch (snitch or container snitch) is a simple framework and command line tool for monitoring Docker containers to identify any …
How To Set Your Phone for Better Privacy and Security?
The default factory settings on your phone are a double-edged sword. On one hand, they’re the best way to see …
GandCrab ransomware distributor arrested in Belarus
In a press release last week, the Minister of Internal Affairs of Belarus announced the arrest of a 31-year-old man …
DeimosC2 – A Golang Command And Control Framework For Post-Exploitation
DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that …
CWFF – Create Your Custom Wordlist For Fuzzing
CWFF is a tool that creates a special High quality fuzzing/content discovery wordlist for you at the highest speed possible …
Phishing campaigns, from first to last victim, take 21h on average
Getty Images/iStockphoto A mixed team of security researchers from Google, PayPal, Samsung, and Arizona State University has spent an entire …
How the FBI tracked down the Twitter hackers
Image: Volodymyr Hryshchenko, ZDNet, Twitter After earlier today US law enforcement charged three individuals for the recent Twitter hack, with …
Kubei – A Flexible Kubernetes Runtime Scanner
Kubei is a vulnerabilities scanning tool that allows users to get an accurate and immediate risk assessment of their kubernetes …
Cybersecurity Best Practices for SMB IT
It’s time to recalibrate your thinking if you believe your enterprise is safe from hackers because your business is considered …