Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database
CVE-2021-21257PUBLISHED: 2021-06-18
Contiki-NG is an open-source, cross-platform operating system for internet of things devices. The RPL-Classic and RPL-Lite implementations in...
By: Ravie Lakshmanan
A relatively new crypto-mining malware that surfaced last year and infected thousands of Microsoft SQL Server (MSSQL) databases has now been linked...
By: Ravie Lakshmanan
The U.S. Department of Justice yesterday announced updates on two separate cases involving cyberattacks—a Swiss hacktivist and a Russian hacker who planned...
Mar 24, 2024NewsroomRansomware / Threat Intelligence
German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data,...
By: Tina Martin
Why You Need Cybersecurity to Protect Your Greatest Assets
When it comes to cybersecurity, you can never be too careful. After all, not...
Alphabet unit Google on Tuesday found itself in the EU antitrust spotlight again as regulators opened an investigation into its lucrative digital advertising business...
The Trendnet TEW-831DR WiFi Router was found to have multiple vulnerabilities exposing the owners of the router to potential intrusion of their local WiFi...
I Can Haz Domain Admin?
Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time.
Usage
Flags
This...
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware.
Sniffle has a number of useful features, including:
Support for BT5/4.2 extended...
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services.
COMING SOON: SMB,...
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...
Authored by sfewer-r7, remmons-r7 | Site metasploit.com
This Metasploit module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create...
Authored by h00die-gr3y, usd Herolab | Site metasploit.com
A remote code execution vulnerability in Gambio online webshop versions 4.9.2.0 and below allows remote attackers to...