In a press release published today, Dutch police said they have successfully taken down 15 DDoS-for-hire services in the span …
Lunar – A Lightweight Native DLL Mapping Library That Supports Mapping Directly From Memory
A lightweight native DLL mapping library that supports mapping directly from memory Features Imports and delay imports are resolved Relocations …
SEC settles with two suspects in EDGAR hacking case
Securities and Exchange Commission. (Image: WSJ/Twitter) The US Securities Exchange Commission has settled charges today with two of the nine …
Eavesarp – Analyze ARP Requests To Identify Intercommunicating Hosts And Stale Network Address Configurations (SNACs)
A reconnaissance tool that analyzes ARP requests to identify hosts that are likely communicating with one another, which is useful …
How to Ensure Data-Centric Cybersecurity?
In the current cybersecurity landscape, the threats facing enterprises have evolved; and now highlight a growing level of sophistication in …
Cloudflare dumps reCAPTCHA as Google intends to charge for its use
Image: ZDNet, Google Internet web infrastructure company Cloudflare announced plans to drop support for Google’s reCAPTCHA service and move to …
Chromepass – Hacking Chrome Saved Passwords
Chromepass is a python-based console application that generates a windows executable with the following features: Decrypt Chrome saved paswords Send …
Dark_nexus botnet outstrips other malware with new, potent features
A new botnet has entered the threat landscape that researchers say “puts to shame” others on the scene, such as …
Cybersecurity 101 – 3 Tips to Protect Your Business
No matter what your business might be, you need to make sure that your company’s cybersecurity is top-of-the-line. Many small …
Tails 4.5 – Live System to Preserve Your Privacy and Anonymity
The Tails team is happy to publish Tails 4.5, the first version of Tails to support Secure Boot.This release also fixes …