Aiodnsbrute – DNS Asynchronous Brute Force Utility[*] A Python 3.5+ tool that uses asyncio to brute force domain names asynchronously. Speed It’s fast. Benchmarks on small......
Author: admin
goaccess v1.6.1 releases: real-time web log analyzer and interactive viewer
goaccess v1.6.1 releases: real-time web log analyzer and interactive viewerGoAccess GoAccess is an open-source real-time web log analyzer and interactive viewer that runs in a terminal on *nix systems...
CRACKMAPEXEC v5.3 – A swiss army knife for pentesting networks
CRACKMAPEXEC v5.3 – A swiss army knife for pentesting networksCRACKMAPEXEC CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory...
Bypass Url Parser: tests many url bypasses to reach a 40X protected page
Bypass Url Parser: tests many url bypasses to reach a 40X protected pageBypass Url Parser A tool that tests MANY urls bypasses to reach a 40X protected...
Google sends alert about “Hermit” spyware on Android and iOS devices
Google sends alert about “Hermit” spyware on Android and iOS devicesEXECUTIVE SUMMARY: Google has issued an alert concerning government-grade spyware on phones. The company warns that...
CISOs Gain False Confidence in the Calm After the Storm of the Pandemic
CISOs Gain False Confidence in the Calm After the Storm of the PandemicContenido de la entradaLeer másProofpoint News Feed
thehackernews – FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
The Hacker News The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a joint advisory warning that Russia-backed...
threatpost – ‘CryptoRom’ Crypto-Scam is Back via Side-Loaded Apps
threatpost Scammers are bypassing Apple’s App Store security, stealing thousands of dollars’ worth of cryptocurrency from the unwitting, using the TestFlight and WebClips programs. For about...
cisomag – Global Affairs Canada Hit by Cyberattack
While the officials did not mention the attackers behind the security incident on Global Affairs Canada, a probe had been initiated to investigate the cyberattack. CISOMAG...
cisomag – 3 Common IoT Attacks that Compromise Security
Unpatched vulnerabilities and design flaws in IoT devices have become a gateway for threat actors to penetrate user and corporate networks. CISOMAG The explosion of IoT...
theregister – Ukraine uses Clearview AI facial-recognition technology
Controversial search engine being used to identify dead and Russian operatives The Register The Ukrainian government is using facial recognition technology from startup Clearview AI to...
theregister – Viasat, Rosneft hit by cyberattacks as Ukraine war spills online
One shows signs of a state-sponsored intrusion, the other potentially not The Register Signs of Russian cyberattacks on Western-owned digital systems have begun to emerge –...
thehackernews – Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords
The Hacker News French video game company Ubisoft on Friday confirmed it was a victim of a “cyber security incident,” causing temporary disruptions to its games,...
INFOSECURITY – Omicron Scam Targets Universities
Dozens of universities are being hit with a coordinated cyber-attack that uses news of the Omicron variant as a lure to steal login credentials. Evidence of...
INFOSECURITY – PFIZER ALLEGES INSIDER STOLE #COVID19 VACCINE DOCS BY PHIL MUNCASTER – DATA STOLEN , INSIDER THREAT.
Pharmaceuticals giant Pfizer alleges that an employee stole COVID-19 vaccine secrets in advance of a job move to a rival company. The New York-headquartered firm filed...
cisomag – Vestas Cyberattack Impacts Internal IT Systems
estas Wind Systems has been a victim of a cybersecurity incident; however, there is no indication it has impacted third-party operations. CISO MAG Vestas Wind Systems,...
cisomag – New Trojan ‘‘Android.Cynos.7.origin’’ Infects 9Mn Android Devices
The newly discovered Trojan “Android.Cynos.7.origin” targets Russian and Chinese gamers, and has infected over 9.3 million Android devices via mobile games. CISO MAG Security researchers from Doctor...
darkreading – Is It OK to Take Your CEO Offline to Protect the Network?
Are you asking the right questions when developing your incident response playbook? What security tasks are you willing to automate? DARKReading Let’s say there’s a ransomware...
thehackernews- What Avengers Movies Can Teach Us About Cybersecurity
The Hacker News Marvel has been entertaining us for the last 20 years. We have seen gods, super-soldiers, magicians, and other irradiated heroes fight baddies at...
10 Cyber Security Recommendations for Black Friday and Cyber Monday by Aguile 1
With more individuals expecting to purchase online this year as the Coronavirus outbreak, fraudsters have increased their scams in preparation for Black Friday and Cyber Monday....
hamiltonpolice – Arrest Made in $46 Million Dollar Cryptocurrency Theft
HAMILTONPOLICE In March of 2020, Hamilton Police entered into a joint investigation with the Federal Bureau of Investigations and the United States Secret Service Electronic Crimes...
darkreading – How Attackers Weigh the Pros and Cons of BEC Techniques
Security researchers discuss attackers’ evolving methodologies in business email compromise and phishing campaigns. DARKReading RSA CONFERENCE 2021 – Business email compromise (BEC) and phishing attacks make up...
techrepublic – 8 advanced threats Kaspersky predicts for 2022
Advanced threats constantly evolve. This year saw multiple examples of advanced persistent threats under the spotlight, allowing Kaspersky to predict what threats might lead in the...
bleepingcomputer – Microsoft Exchange servers hacked in internal reply-chain attacks
BLEEPING COMPUTER Threat actors are hacking Microsoft Exchange servers using ProxyShell and ProxyLogon exploits to distribute malware and bypass detection using stolen internal reply-chain emails. When...
theregister – Boffins find way to use a standard smartphone to find hidden spy cams
Smartphones now have lasers so we’re gonna use them to find voyeurs The Register Recent model smartphones can be smarter still about finding hidden cameras in...
barracuda – Threat Spotlight: Bait attacks
BARRACUDA As attackers work to make their phishing attacks more targeted and effective, they’ve started researching potential victims, working to collect information that will help them improve the...
ncsc – NCSC Annual Review 2021
National Cyber Security Center The National Cyber Security Centre (NCSC), a part of GCHQ, is the UK’s technical authority for cyber security. Since the NCSC was...
securelist – Financial threat predictions for 2022
SECURELIST by Kaspersky 2021 is the second year we have had to live through huge changes in both our personal lives and at work. Remote work...
cisomag – Cybersecurity is a Low Priority for India’s Private Sector
High levels of investments are required to improve the private sector’s cybersecurity framework and regulatory compliance in India. CISO MAG In the movie Die Hard 4.0, John McClane...
securityaffairs – Threat actors hacked email servers of the FBI to distribute spam email impersonating FBI warnings of fake cyberattacks.
SECURITY AFFAIRS The email servers of the FBI were hacked to distribute spam email impersonating the Department of Homeland Security (DHS) warnings of fake sophisticated chain...























