A report from government agencies in Taiwan indicates that the country faces over five million cyber probes and attacks daily. …
Google Declares Prizes for Tsunami Security Scanner Add-ons
Earlier this week, in a statement, Google declared that it is issuing cash payouts to persons who help the company …
Microsoft Researches Ransomware Attack Targeting App Developers
Stories of ransomware assaults are common in many headlines worldwide. The attacks target both large and small businesses alike. Research …
SharpStrike – A Post Exploitation Tool Written In C# Uses Either CIM Or WMI To Query Remote Systems
SharpStrike is a post-exploitation tool written in C# that uses either CIM or WMI to query remote systems. It can …
SEC Sanctions Several Companies over Email Account Hacking
Earlier this week the SEC (Securities and Exchange Commission) in the USA penalized various companies due to cyber security breakdowns. …
Google Explains New Safety and Privacy Guidelines for Android Apps
This week Google announced several upgrades to the rules that govern the Play Store which are intended to enhance the …
Ppmap – A Scanner/Exploitation Tool Written In GO, Which Leverages Prototype Pollution To XSS By Exploiting Known Gadgets
A simple scanner/exploitation tool written in GO which automatically exploits known and existing gadgets (checks for specific variables in the …
Nexfil – OSINT Tool For Finding Profiles By Username
NExfil is an OSINT tool written in python for finding profiles by username. The provided usernames are checked on over …
Series: A Journey in EDR-land ~ Vapra Varta
The series will cover building blocks of EDR, various ways to collect data, analysis and detection methods, and how to …
Honeywell Introduces Operational Technology Cybersecurity Service to Facilitate Monitoring and Response, and Boost Safety
Honeywell is a massive organization in the American industrial market, and an industrial cybersecurity world leader. The organization has introduced …