Latest Cyber Security Updates
Cyber Security News
Critical WordPress-Plugin Bug Found in ‘Orbit Fox’ Allows Site Takeover
Two security vulnerabilities — one a privilege-escalation problem and the other a stored XSS bug — afflict a WordPress plugin with 40,000 installs.
Two...
Cyber Vulnerabilities & Exploits
The latest hacker news
REvil Threatens To Release Dirty Laundry On President Trump If Ransom Is Not Paid
Grubman Shire Meiselas & Sacks, one of the top entertainment law firms in the US, was recently the target of a ransomware...
Microsoft Says Its Systems Were Also Breached in Massive SolarWinds Hack
By: Ravie Lakshmanan
The massive state-sponsored espionage campaign that compromised software maker SolarWinds also targeted Microsoft, as the unfolding investigation into the hacking spree reveals...
Nation-State Hackers Caught Hiding Espionage Activities Behind Crypto Miners
By: Ravie Lakshmanan
A nation-state actor known for its cyber espionage campaigns since 2012 is now using coin miner techniques to stay under the radar...
Learning & Cyber Education
Training Transformers for Cyber Security Tasks: A Case Study on Malicious URL...
Highlights
Perform a case study on using Transformer models to solve cyber security problems
Train a Transformer model to detect malicious URLs under...
Breaches & Data Leaks
Cybersecurity Firm FireEye Got Hacked; Red-Team Pentest Tools Stolen
By: Ravie Lakshmanan
FireEye, one of the largest cybersecurity firms in the world, said on Tuesday it became a victim of a state-sponsored attack by...
Most popular
Citrix SD-WAN Bugs Allow Remote Code Execution
The bugs tracked as CVE-2020–8271, CVE-2020–8272 and CVE-2020–8273 exist in the Citrix SD-WAN Center.
Three security bugs in the Citrix software-defined (SD)-WAN platform would allow...
Juvenile Pleads Guilty to 2016 DNS Attack
Enterprise VulnerabilitiesFrom DHS/US-CERT's National Vulnerability Database
CVE-2020-26271PUBLISHED: 2020-12-10
In affected versions of TensorFlow under certain cases, loading a saved model can result in accessing uninitialized memory...
Coinsquare Database Leak Could Be Used For SIM Swapping
Recent Data Hack Could Put Millions of Dollars in Bitcoin at Risk
AUTHOR: FELIPE ERAZO via Coin Telegraph
Security & Hacking Tools
GitDorker – Scrape Secrets From GitHub Through Usage Of A Large Repository
GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I’ve compiled from various...
Pesidious – Malware Mutation Using Reinforcement Learning
Malware Mutation using Deep Reinforcement Learning and GANs
The purpose of the tool is to use artificial intelligence to mutate a...
Hellraiser – CVE-Search Vulnerability Scanner
HellRaiser
Vulnerability Scanner
Install
HellRaiser depends...
Keepass – Secure Password Management
KeePass Features
Here are some "selling points" of KeePass. To get a first impression, you can also have a...
OSSEC – A full platform to monitor and control your systems
OSSEC v3.6.0 Copyright (C) 2019 Trend Micro Inc.
Information about OSSEC
OSSEC is a full...
Daily Exploits
CASAP Automated Enrollment System 1.0 Cross Site Scripting
Authored by Richard Jones
CASAP Automated Enrollment System version 1.0 suffers from a persistent cross site scripting vulnerability.
Change Mirror Download
# Exploit Title: CASAP ENROLLMENT SYSTEM...
Backdoor.Win32.Noknok.50 Insecure Permissions
Authored by malvuln | Site malvuln.com
Backdoor.Win32.Noknok.50 malware suffers from an insecure permissions vulnerability.
Change Mirror Download
Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/ca80897ee064ab9af5907344b316a247.txtContact:...
Backdoor.Win32.Jokerdoor Insecure Permissions
Authored by malvuln | Site malvuln.com
Backdoor.Win32.Jokerdoor malware suffers from an insecure permissions vulnerability.
Change Mirror Download
Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/6c7b364dafe0560dfb15c9b03f1b44bd.txtContact:...