Don’t be lulled into the false sense of security by thinking your personal information is indeed private – you will …
Nemty ransomware operation shuts down
The operators of the Nemty ransomware have announced this week they were shutting down their service after ten months in …
Htbenum – A Linux Enumeration Script For Hack The Box
This script is designed for use in situations where you do not have internet access on a Linux host and …
Account details for 4 million Quidd users shared on hacking forum
Quidd, an online marketplace for trading stickers, cards, toys, and other collectibles, appears to have suffered a data breach in …
Lollipopz – Data Exfiltration Utility For Testing Detection Capabilities
Data exfiltration utility used for testing detection capabilities of security products. Obviously for legal purposes only.Exfiltration How-To /etc/shadow -> HTTP …
7 Things You Need To Know Before You Develop A Mobile App To Grow Your Business
Mobile devices are in all of our pockets nowadays, aren’t they? Other than making calls and sending messages, these devices …
Senator calls on FTC to create guidelines for video teleconferencing software
Image: Zoom Zoom Tips from techrepublic A US senator has asked the Federal Trade Commission (FTC) this week to look …
Inhale – A Malware Analysis And Classification Tool
Inhale is a malware analysis and classification tool that is capable of automating and scaling many static analysis operations.This is …
Gambling company to set aside $30 million to deal with cyber-attack fallout
Image via AidanHowe on Pixabay Online betting company SBTech will have to place $30 million in escrow as insurance for …
Audix – A PowerShell Tool To Quickly Configure The Windows Event Audit Policies For Security Monitoring
Audix will allow for the SIMPLE configuration of Windows Event Audit Policies. Window’s Audit Policies are restricted by default. This …