Latest Cyber Security Updates
Cyber Security News
Cyber Vulnerabilities & Exploits
The latest hacker news
North Koreas Built A Silent 7000 Strong Cyber Army
ELLEN IOANES, BUSINESS INSIDERJUN 17, 2020 10:06 AM EDT
Editor's Note: This article originally appeared...
Small & Medium Sized Businesses Targeted By Dharma Ransomware
Small and medium businesses (SMBs) are witnessing an increased ransomware attack globally, including in India, this year and the ransom demands have...
Ukrainian Police Arrest Author of World’s Largest Phishing Service U-Admin
By: Ravie Lakshmanan
Law enforcement officials in Ukraine, in coordination with authorities from the U.S. and Australia, last week shut down one of the world's...
Learning & Cyber Education
Fuzzing Image Parsing in Windows, Part Two: Uninitialized Memory
Continuing our discussion of image parsing vulnerabilities in Windows, we take a look at a comparatively less popular vulnerability class: uninitialized memory. In this...
Breaches & Data Leaks
Federal agency has suffered a successful espionage-related cyberattack
By: Tara Seals
The attack featured a unique, multistage malware and a likely PulseSecure VPN exploit.
Most popular
ZTE MF253V 1.0.0B04 XSS / CSRF / Hardcoded Password
Authored by T. Weber, S. Robertz | Site sec-consult.com
ZTE WLAN router MF253V version 1.0.0B04 suffers from cross site request forgery, hardcoded password, outdated component,...
Proofpoint sues Facebook over dummy sites used for anti-phishing training
Written by Shannon...
Security & Hacking Tools
GitDorker – Scrape Secrets From GitHub Through Usage Of A Large Repository
GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I’ve compiled from various...
Pesidious – Malware Mutation Using Reinforcement Learning
Malware Mutation using Deep Reinforcement Learning and GANs
The purpose of the tool is to use artificial intelligence to mutate a...
Hellraiser – CVE-Search Vulnerability Scanner
HellRaiser
Vulnerability Scanner
Install
HellRaiser depends...
Keepass – Secure Password Management
KeePass Features
Here are some "selling points" of KeePass. To get a first impression, you can also have a...
OSSEC – A full platform to monitor and control your systems
OSSEC v3.6.0 Copyright (C) 2019 Trend Micro Inc.
Information about OSSEC
OSSEC is a full...
Daily Exploits
CASAP Automated Enrollment System 1.1 SQL Injection
Authored by nu11secur1ty
CASAP Automated Enrollment System version 1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Change Mirror Download
# Exploit Title:...
Web Based Quiz System 1.0 Cross Site Scripting
Authored by Praharsh Kumar Singh
Web Based Quiz System version 1.0 suffers from a persistent cross site scripting vulnerability related to MCQ options.
Change Mirror Download
#...
Backdoor.Win32.DarkKomet.irv Insecure Permissions
Authored by malvuln | Site malvuln.com
Backdoor.Win32.DarkKomet.irv malware suffers from an insecure permissions vulnerability.
Change Mirror Download
Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/341b2c3222122bd25c8509fc09534dec.txtContact:...