By: Ravie Lakshmanan
A threat actor with affiliations to the cyber warfare division of Hamas has been linked to an "elaborate campaign" targeting high-profile Israeli...
By: The Hacker News
DDoS (Distributed Denial of Service) attacks are making headlines almost every day. 2021 saw a 434% upsurge in DDoS attacks, 5.5...
Author: Wang Wei from TheHackerNews
A team of cybersecurity researchers today outed a little-known Indian IT firm that has secretly been operating as a global...
By: Ravie Lakshmanan
A Chinese advanced persistent threat (APT) group has been targeting Taiwanese financial institutions as part of a "persistent campaign" that lasted for...
By: Tina Martin
Why You Need Cybersecurity to Protect Your Greatest Assets
When it comes to cybersecurity, you can never be too careful. After all, not...
By: The Hacker News
We hear about the need for better visibility in the cybersecurity space – detecting threats earlier and more accurately. We often...
Authored by Antonio Cuomo
WOW21 version 5.0.1.9 suffers from an unquoted service path vulnerability.
Change Mirror Download
# Exploit Title: WOW21 5.0.1.9 - 'Service WOW21_Service' Unquoted Service...
A glitch in Zoom’s screen-sharing feature shows parts of presenters’ screens that they did not intend to share – potentially leaking emails or passwords.
A...
I Can Haz Domain Admin?
Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time.
Usage
Flags
This...
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware.
Sniffle has a number of useful features, including:
Support for BT5/4.2 extended...
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services.
COMING SOON: SMB,...
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...
Authored by Michael Baer | Site sec-consult.com
Checkmk Agent versions 2.0.0, 2.1.0, and 2.2.0 suffer from a local privilege escalation vulnerability.
advisories | CVE-2024-06070
Change Mirror Download
SEC...
Authored by SoSPiro
Membership Management System version 1.0 suffers from remote shell upload and remote SQL injection vulnerabilities.
Change Mirror Download
from requests_toolbelt.multipart.encoder import MultipartEncoderimport requestsimport stringimport...
Authored by nu11secur1ty
HALO version 2.13.1 has an insecure cross-origin resource sharing setting that allows an arbitrary origin.
Change Mirror Download
## Title: HALO-2.13.1 Cross-origin resource sharing:...