New infosec products of the week: April 26, 2024
What AI can tell organizations about their M&A risk
Most people still rely on memory or pen and paper for password management
Breaking down the numbers: Cybersecurity funding activity recap
LSA Whisperer: Open-source tools for interacting with authentication packages
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
Midnight Blizzard: Guidance for responders on nation-state attack
PCI Launches Payment Card Cybersecurity Effort in the Middle East
Security Analysis of an IX2400 VPN Gateway: Reconnaissance Part II | by Marcel Rick-Cen | Apr, 2024 | Medium
Chinese Keyboard Apps Open 1B People to Eavesdropping
Understanding 403 Bypass: A Critical Vulnerability in Web Application Security | by Abhishek Bhujang | Apr, 2024 | InfoSec Write-ups
Not the Access You Asked For: How Azure Storage Account Read/Write Permissions Can Be Abused for Privilege Escalation and Lateral Movement | by Yehuda Tamir | Apr, 2024 | Medium
Privilege Escalation to Admin through an Import Feature | by Cristi Vlad | Apr, 2024 | Medium
Threat Modeling and Understanding Inherent Threats – Adam Shostack – ESW #359
Rubrik IPO signals potential cybersecurity-led tech market revival
ArcaneDoor Hackers Exploit Cisco Zero-Days To Breach Government Networks | Daily Security Review
CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog
Hackers Leak Code Of El Salvador’s Official State Bitcoin Wallet “Chivo” | Daily Security Review
AeroNet Wireless Launches 10Gbps Internet Plan: A Landmark Moment in Puerto Rico’s Telecommunications Industry
FBI warns against using unlicensed crypto transfer services
FTC Issues $5.6M in Ring Privacy Refunds to Customers
5 Attack Trends Organizations of All Sizes Should Be Monitoring
The Biggest 2024 Elections Threat: Kitchen-Sink Attack Chains
After a 19-month saga, Broadcom finally patches Brocade SANnav bugs
LA County Health Services: Patients' data exposed in phishing attack
Net neutrality has been restored
Researchers sinkhole PlugX malware server with 2.5 million unique IPs
Godfather Banking Trojan Spawns 1.2K Samples Across 57 Countries
The private sector probably isn’t coming to save the NVD
North Korea's Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Reddit down in major outage blocking access to web, mobile apps
Over 1,400 CrushFTP servers vulnerable to actively exploited bug
Cisco Zero-Days Anchor 'ArcaneDoor' Cyber Espionage Campaign
Digital Blitzkrieg: Unveiling Cyber-Logistics Warfare
WP Automatic WordPress plugin hit by millions of SQL injection attacks
SolarWinds 2024: Where Do Cyber Disclosures Go from Here?
US Takes Down Illegal Cryptocurrency Mixing Service Samourai Wallet
Learn from the NHS - Proactive Password Security for Improved Cybersec
Cisco firewalls targeted in sophisticated nation-state espionage hack
Ransomware triggers cyberinsurance claims increase
DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions
CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog
NIST's role in the global tech race against AI
State-Sponsored Espionage Campaign Exploits Cisco Vulnerabilities
I Finally Did It. Never thought I would say that I… | by David | Apr, 2024 | Medium
Almost a billion users' keystrokes possibly leaked by Chinese keyboard apps
Lincoln Project loses $35K following BEC attack
Ongoing global malware attack campaign seeks network compromise
Google Patches Critical Chrome Vulnerability and Additional Flaws
NDR in the Modern Cybersecurity Landscape
Dropzone AI raises $16.85 million to combat advanced AI attacks
Edgio Client-Side Protection enables organizations to secure critical customer data
IBM to buy HashiCorp in $6.4 billion cash deal, expanding cloud portfolio
Stellar Cyber and Acronis team up to provide optimized threat detection solutions for MSPs
Popular File Transfer Software CrushFTP Hit by Zero-Day Exploit
ESET integrates with Arctic Wolf to provide greater security visibility
Sublime Security secures $20 million to strengthen cloud email security and visibility
WhyLabs AI Control Center offers teams real-time control over their AI applications
CoralRaider targets victims’ data and social media accounts
Redline Stealer: A Novel Approach
Cisco Talos Incident Response - Cisco Talos Blog
Talos IR trends - Cisco Talos Blog
Talos IR trends: BEC attacks surge, while weaknesses in MFA persist
11% of Cybersecurity Teams Have Zero Women
DragonForce Ransomware Group Uses LockBit’s Leaked Builder
How an adaptive approach can stop AI-based DDoS attacks
DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions
Network Threats: A Step-by-Step Attack Demonstration
56% of cyber insurance claims originate in the email inbox
We are sorry for the temporary outage.
BEC and Fund Transfer Fraud Top Insurance Claims
Online Banking Security Still Not Up to Par, Says Which?
Google fixed critical Chrome vulnerability CVE-2024-4058
Dropbox announces a number of security and data protection features
Fireblocks expands DeFi suite with threat detection features
Anatomy IT's new Security Suite targets healthcare cybersecurity threats, improves incident response
Appdome upgrades MOBILEBot Defense for tailored WAF integration
AuditBoard AI automates important tasks for security teams
Understanding 403 Bypass: A Critical Vulnerability in Web Application Security | by Abhishek Bhujang | Apr, 2024 | InfoSec Write-ups
Google Postpones Third-Party Cookie Deprecation Amid U.K. Regulatory Scrutiny
Nagomi Security raises $30 million to help security teams improve their level of protection
BforeAI raises $15 million to prevent attacks before they occur
High Performance Podcast Duo to Unveil Secrets of Success at Infosec
IOS Penetration Testing: Guide to Static Analysis | by Aditya Sawant | Apr, 2024 | Medium
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
Applying DevSecOps principles to machine learning workloads
73% of SME security pros missed or ignored critical alerts
Overcoming GenAI challenges in healthcare cybersecurity
25 cybersecurity AI stats you should know
JA4T: TCP Fingerprinting and How to Use It to Block Over 60% of Internet Scan Traffic | FoxIO
Don’t Fear the Retake: How I Aced the ISC2 Certified in Cybersecurity | by Madhurhase | Apr, 2024 | Medium
Maximum severity Flowmon bug has a public exploit, patch now
US charges Samourai cryptomixer founders for laundering $100 million
Attacker Social-Engineered Backdoor Code Into XZ Utils
Black Girls Do Engineer Signs Education Partnership With NSA
KnowBe4 to Acquire Egress
The End of Public Key Encryption? Meet The Piger Fabrica Syndrome | by Prof Bill Buchanan OBE FRSE | Mar, 2024 | Medium
$42 Million Ransom Spree & North Korea AI Cyber Attacks, Cyber News Beat | by Michael Lopez | Apr, 2024 | Medium
5G Hackathons – Casey Ellis – BTS #28
CoralRaider leverages CDN cache domains in new infostealer campaign
Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks -
Ukrainian documents laced with old malware exposed
Dark web inundated by cheap ransomware tools
Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
Lights On in Leicester: City Streetlights in Disarray After Cyberattack
AI tapped by Torq HyperSOC to better combat cyber threats
US indicts botnet operator
ArcaneDoor hackers exploit Cisco zero-days to breach govt networks
3 DPRK APTs Spied on South Korea Defense Industry
FBI: Disruptive Chinese attacks against US infrastructure imminent
Elusive group ToddyCat refines techniques for large-scale data theft
Google patches critical type-confusion flaw in Chrome browser
Google Meet opens client-side encrypted calls to non Google users
Ring customers get $5.6 million in privacy breach settlement
Windows 11 KB5036980 update goes live with Start Menu ads
2023: A 'Good' Year for OT Cyberattacks
Iran Dupes US Military Contractors, Gov't Agencies in Cyber Campaign
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
US Congress Passes Bill to Ban TikTok
SynLab Italia disrupted by cyberattack
Antivirus updates exploited for GuptiMiner malware deployment
Global cyber incident detection capabilities improve
Improved ransomware attack response aimed by Veeam's Coveware purchase
Proposed FTC commercial surveillance rules expected soon
Hackers hijacked the eScan Antivirus update mechanism in malware campaign
Researchers develop malicious AI ‘worm’ targeting generative AI systems
1Kosmos CSP enables government agencies to digitally verify resident identity
Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs
Fortify AI Training Datasets From Malicious Poisoning
US Sanctions Iranian "Fronts" for Cyber-Attacks on American Entities
Leeds Talent Pool Attracts BlueVoyant’s First UK SOC
US cracks down on Iranians behind government, defense contractor hacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
UnitedHealth Group Confirms It Paid Ransomware To Prevent Data Leak | Daily Security Review
Dexalot Announces Launch of Its Central Limit Order Book DEX on Arbitrum
Zero Networks unveils identity segmentation solution to prevent credential theft
PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)
Cyberint platform enhancements boost protection against external threats
The Art of Threat Hunting: uncovering the Shadowed Menace | by Paritosh | Apr, 2024 | Medium
Popular Keyboard Apps Leak User Data: Billion Potentially Exposed
Russian APT28 Exploiting Windows Vulnerability with GooseEgg Tool
GISEC Global 2024 video walkthrough
New Relic AI monitoring helps enterprises use AI with confidence
Secureworks enables users to view known vulnerabilities in the context of threat data
Global attacker median dwell time continues to fall
Comcast Business MDR limits the impact of cyber threats
Security Leaders Braced for Daily AI-Driven Attacks by Year-End
Three imminent risks of AI – and what the industry should do about them
Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users
Photos: GISEC Global 2024
Prophet Security emerges from stealth and raises $11 million
Binarly releases Transparency Platform v2.0 to improve software supply chain security
Fifth of CISOs Admit Staff Leaked Data Via GenAI
North Korean Hackers Target Dozens of Defense Companies
Hack Stories: Hacking Hackers EP:3 | by c0d3x27 | Apr, 2024 | InfoSec Write-ups
US offers a $10M reward for information on four Iranian nationals
Street lights in Leicester City cannot be turned off due to a cyber attack
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
The relationship between cybersecurity and work tech innovation
AI set to play key role in future phishing attacks
Cybersecurity jobs available right now: April 24, 2024
Massive Brute-Force Attack on Alibaba Affects Millions
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
GenAI can enhance security awareness training
Whitepaper: MFA misconceptions
eBook: Cloud security skills
Day in the Life of a SOC Analyst. I am about to explain to you what an… | by Tyler Wall | Apr, 2024 | Medium
How easy I made $$$$. Good morning! | by Anas H Hmaidy | Apr, 2024 | Medium
Best Laptop for Cyber Security. This One If For All My IT People | by Kelvin | Mar, 2024 | Medium
Bypassing CloudFlare Error 1015: You Are Being Rate Limited | by H4cker-Nafeed | Apr, 2024 | Medium
CoralRaider attacks use CDN cache to push info-stealer malware
Microsoft pulls fix for Outlook bug behind ICS security alerts
5 Hard Truths About the State of Cloud Security 2024
Siemens Working on Fix for Device Affected by Palo Alto Firewall Bug
CompTIA Supports Department of Defense Efforts to Strengthen Cyber Knowledge and Skills
TensorFlow AI models at risk due to Keras API flaw
Microsoft releases Exchange hotfixes for security update issues
US govt sanctions Iranians linked to government cyberattacks
Back from the Brink: UnitedHealth Offers Sobering Post-Attack Update
Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments
Email Verification Bypass via Remember Me | by mo9khu93r | Apr, 2024 | InfoSec Write-ups
A 'substantial proportion' of Americans exposed in Change Healthcare cyberattack
North Korea-linked APT groups target South Korean defense contractors
DPRK hacking groups breach South Korean defense contractors
US Imposes Visa Restrictions on Alleged Spyware Figures
Volkswagen Breached By Chinese Hackers | Daily Security Review
APT28 Uses GooseEgg To Exploit Windows Flaw | Daily Security Review
Frontier Communications Cyberattack Disrupts IT Systems | Daily Security Review
Nespresso Domain Hijacked in Phishing Attack Targeting Microsoft Logins
20.3 Lab: Web cache poisoning via ambiguous requests | 2024 | by Karthikeyan Nagaraj | Apr, 2024 | Medium
Passwords, passkeys and familiarity bias
Apache Cordova App Harness Targeted in Dependency Confusion Attack
0G and OnePiece Labs Collaborate to Create Crypto x AI Incubator
Forcepoint DSPM safeguards sensitive information by examining data context and content
Invicti Predictive Risk Scoring identifies highest-risk applications
Hackers hijack antivirus updates to drop GuptiMiner malware
UnitedHealth confirms it paid ransomware gang to stop data leak
US imposes visa bans on 13 spyware makers and their families
Lessons for CISOs From OWASP's LLM Top 10
Millions of Americans' Data Potentially Exposed in Change Healthcare
End-to-End Encryption Sparks Concerns Among EU Law Enforcement
Indiana water plant hack admitted by Russian hackers
New Bitsight, Moody's service seeks to bolster cyber risk management
Russian group exploits Windows print spooler bug via ‘GooseEgg’ malware
US Gov Slaps Visa Restrictions on Spyware Honchos
Russia's Fancy Bear Pummels Windows Print Spooler Bug
Vulnerability Exploitation on the Rise as Attackers Ditch Phishing
Email Verification Bypass via Remember Me | by mo9khu93r | Apr, 2024 | InfoSec Write-ups
Ukraine critical infrastructure subjected to Sandworm attacks
Rootkit capabilities likely with Windows bugs
Sophisticated tool arsenal enables widespread ToddyCat data compromise
GitHub Comments Abused to Spread Malware in Fake Microsoft Repositories
Entrust protects users against fraud, phishing and other account takeover attacks
Netwrix 1Secure enhancements accelerate threat detection
Stellar Cyber launches MITRE ATT&CK Coverage Analyzer
Veeam acquires Coveware to boost its ransomware protection capabilities
Veritas enhances cyber resilience with AI-powered solutions
Russian hackers' custom tool exploits old Windows Print Spooler flaw (CVE-2022-38028)
VPNs, Firewalls' Nonexistent Telemetry Lures APTs
Suspected CoralRaider continues to expand victimology using three information stealers
ChargeHash. I love hashing methods. I think it is… | by Prof Bill Buchanan OBE FRSE | ASecuritySite: When Bob Met Alice | Apr, 2024 | Medium
Navigating the ethical frontiers of our digital ecosystem
German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies
Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Webinar: Learn Proactive Supply Chain Threat Hunting Techniques
This Website is Selling Billions of Private Messages of Discord Users
Sanitising Your Git History. How to clear your Git to improve… | by Jake Teo | Apr, 2024 | Level Up Coding
My Grandfather Didn’t Trust Banks. Now, Digital Banking Makes People Feel the Same Way. | by George “Ace” Acevedo | ILLUMINATION-Curated | Apr, 2024 | Medium
Can we trust AI to take care of us? | by Linda Margaret | Brain Labs | Apr, 2024 | Medium
Browser Extensions For The Win!. Hey there, fellow internet explorers… | by LALITH SURYA | Apr, 2024 | Medium
Make Money 💸 Using Google Hacking | by Ott3rly | Apr, 2024 | Medium
How to Check if your iPhone is Infected with Spyware/Stalkerware | by Rubens Zimbres | Medium
HACKTHEBOX CBBH REVIEW. Training Journey | by Admiralhr | Apr, 2024 | Medium
U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity
Trellix Email Security for Microsoft Office 365 improves email defense
CrushFTP zero-day exploited by attackers, upgrade immediately! (CVE-2024-4040)
Russian APT28 Group in New “GooseEgg” Hacking Campaign
Russian Sandworm Group Hit 20 Ukrainian Energy and Water Sites
Medium
Explore topics
How I could have hacked one LG website with a simple recon… | by RubX | Apr, 2024 | Medium
Ring customers get $5.6 million in refunds in privacy settlement | AP News
If Data Is The New Gold, What Are Regulators And Authorities Doing To Protect It?
North American Developers Optimistic About Generative AI and Code Security - Security Boulevard
(The) Postman Carries Lots of Secrets ◆ Truffle Security Co.
Dependency Confusion Vulnerability Found in an Archived Apache Project 
How I Figure Out A Lock For The First Time - YouTube
Coverage Guided Fuzzing - Extending Instrumentation to Hunt Down Bugs Faster! - Include Security Research Blog
Horacius (IAM) - Local privilege escalation, even without a Windows account.
Cyber Diaries Podcast E8 - Joe Head - CISO Coaching - YouTube
GitHub - BC-SECURITY/Moriarty: Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in Windows environments.
evren's blog
How MFA Is Falling Short
Baldur
Literal Security Measures
030 Robur 2391 with barrels pick & gut. Red. - YouTube
TyphoonCon 2024 Tickets, Mon, May 27, 2024 at 8:00 AM | Eventbrite
SPP Master 570 - YouTube
Are We Ready for a Cyber Attack on Food and Farming?
ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices
JA4T: TCP Fingerprinting and How to Use It to Block Over 60% of Internet Scan Traffic | FoxIO
XZ Utils Rundown: What We Learned and What To Do Next
Exploiting a Classic Deserialization Vulnerability in Siemens SIMATIC Energy Manager | Claroty
18 vulnerabilities in Brocade SANnav - IT Security Research by Pierre
FTC Announces Rule Banning Noncompetes | Federal Trade Commission
GitHub - fin3ss3g0d/ASPJinjaObfuscator: Heavily obfuscated ASP web shell generation tool.
Veterinary services giant reports 'cyber incident' • The Register
Ads on .gov.uk websites raise eyebrows over privacy • The Register
Grafana backend sql injection affected all version | fdvoid0's blog
Printables
GitHub - redrays-io/SAP-Threat-Modeling: The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features
Nation-State Threat Actors Renew Publications to npm
AI can predict political orientations from blank faces – and researchers fear 'serious' privacy challenges | Fox News
Miscreants get their mits on the world’s KYC database • The Register
Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme – Krebs on Security
Webinar: Govern your data across your entire data estate using Microsoft Purview - Netwoven
(006) Abus ec75 dimple lock picked! - YouTube
Directive - 2011/83 - EN - consumer rights directive - EUR-Lex
CVE-2024-2389: Command Injection Vulnerability In Progress Flowmon - Rhino Security Labs
GitHub - emptynebuli/dauthi
BlackBerry MDM Has Some Authentication Flaws | Into the Abyss
🔥 Unleashing the Power of Artificial Intelligence - Prompt Engineering 🔥 - YouTube
Positron Security
How easy I made $$$$. Good morning! | by Anas H Hmaidy | Apr, 2024 | Medium
The backend server for the Multi-Presence proof of concept
Modern Community Cheats 9000K coins Mod Hacks tutorial
Comp sec code
Ecommerce project using Spring Boot, Spring Data JPA, Spring Security, and PostgreSQL.
i'm hacker
Proof of concept application for a MEAN stack
Back-end for Terra: A Carbon Footprint Calculator Web App (3rd Place R. U. Hacking? Hackathon 2021)
Here is the code that I have done in my Brain Hack event for the Julia__nn project
SocialMediaRecovery is a GitHub project designed to help people regain control of their hacked social media accounts. It collaborates with HackBite.com to offer straightforward assistance across different platforms.
Java_Authentication_SpringSecurity
Core project base on spring boot, available config such as Spring Security, Interceptor, Database Connections...
SpringSecurity
An advanced fleet management system for tracking cars, scheduling maintenance, and analyzing performance. It uses ASP.NET and PostgreSQL for high security and performance.
to project
This PDF Exploit IS SUPPORT ANDROID, WINDOWN, LINUX OS Hack any operating system send PDF exploit
"Gophisher" is an Android app designed to protect users from phishing attacks. It monitors installed apps and website activities in real-time, alerting users to potential threats and providing tools to take action. With features like application permissio
why did i make another dumb roblox bedwars hack
For hack challenge
hacks for Slap Battles (PC)
spring-security-demo
Security suite to encrypt an end to end chat, using cryptography techniques, socket programming and threading.
Collection of Rom Hacks and Save Files that I either created or would recommend
This is a simple RESTful API built with Node.js and Express.js for managing book entries. The API offers CRUD operations for book management, user authentication, filtering books by author or publication year, and basic security measures.
application security training
Empowering users with personal data security and control.
ioctl driver base with kernel and user mode | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, valorant driver, cheats, hacks, hack, undetected, cracked, ud, external, int
spring-security
updated Enigma Public Selfleak | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, valorant driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, r
📍 Sources for Offensive Security, 9th ed.
Proof-of-concept for source code data harvesting and reporting
Front-end for Terra: A Carbon Footprint Calculator Web App (3rd Place R. U. Hacking? Hackathon 2021)
SecuritySchemesAPIs
Welcome, all hacking tools.....
HotelBookingAppWithSBSpringSecurityAndReactJs
Game Visual Novel 20 Days of Hacker Girl - Hafizh H Asyhari
"Guardian-Vision: Empowering Security with Smart Surveillance - Detects weapons/knives, alerts authorities via email/WhatsApp. Stay safe, stay aware.
Security_Lab_5
Proof of concept of an implementation of control tables learn with Reinforcement Learning in a PLC
Repositorio para writeups de la serie blue team "Sherlocks" de Hack the Box
How I passed my security + exam
web server development proof-of-concept in MoonBit language
Leveraging the power of multimodal LLaVA LLM to give to image files relevant names. Quick hack built on top of llama.cpp.
A Spring Security RBAC Template For Me To Use For Securing Applications
Proof of concept of how to overwrite records from cernopendata-portal
Cryptography Project
this is a code solution for hacker rank problem solving question
security-laravel
spring-security-jwt-v2
Proof-of-concept--PoC--script-for-Windows-Privilege-escalation-and-System-enumeration-
The ultimate goal of the "Mine vs. Rock Prediction" project is to develop a reliable and accurate model that can assist in real-world scenarios such as underwater mine detection, ensuring the safety and security of maritime operations. Continued refinemen
Welcome to the E-CODERS! We are the ethical hackers, don't worry to be suprised that "oh no, these guys can hack our accounts!"! More information in ReadMe...
FileEncryptionAndSecurity
WebHackingExercise
Fortnite Skinswapper , skinchanger, skins , cheat , hack
SpringSecurityTemplate
Python scripts for Dolphin Memory hacking
Learn about Ransomware (This is not a hacking tutorial or anything of the sort, it's just knowledge sharing) 🔐
League Of Legends cheat , hack, skinswapper , Evade Prediction Orbwalker Target Selector Combos Activator Anti Cheat Bypass
스프링 부트 3.1 시큐리티 예제
A simple proof of concept for the lalr parsing method.
using for sun-hacks
Roblox executor , cheat hack, aimbot , esp, speedhack , flyhack , autofarm , autokill , fruits , farm boss , Devil Fruits
-avast-premium-security
security_system_ai
HACKING-THE-FUTURE-WIA1002-Group-Assignment
pasterx updated | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, valorant driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, lege
I am hacker
a cloned script for Instagram
Prototipo Hack AI
An automatic gate opener system made using Arduino, ultrasonic sensor, and servo motor, controlled by Java. It detects objects' proximity and opens the gate accordingly, enhancing security and convenience. This project exemplifies practical technology app
valorant cheat valorant hack valorant aim aimbot valorant wh wallhack valorant esp valorant hack 2024
fortnite offsets | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, valorant driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, leg
Dead by Daylight , cheat , hack , esp , speedhack , teleport , tp ,bloodpoints , all dlc
my-security-reviews
Content of book Black Hat Go - Go Programming for Hackers and Pentesters
timefn updated | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, valorant driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, legen
Repositorio HACK AI
Ultimate Linux Network Security for Enterprises, published by Orange, AVA™
Smart Farm management has four sectors: automated water supply, interactive food supply, security and safety, and air circulation/cleaning. The automated water supply system maintains water levels in tanks and food supply control food amount and delivery.
Hack Sweden is a one-time hackathon on the theme “public good software”. We want to encourage people to build stuff that can help inhabitants of Sweden. The primary focus will be taking advantage of open data and APIs made available by government agencies
shitcode community expose | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, valorant driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust,
The Application Security Assessment Assistant
Cyber-Security-Demo-NRPC
Proof-of-concept of adding geospatial support to Apache Iceberg
System to automate Security Training Enforcement record keeping
I want a Aviator hack bot
Proof of concept for PerseverNow chatbot with the idea of adding this to our curriculum. It uses Hugging Face which is like omg and eventually the MERN stack because that is what our curriculum is based on. This first iteration is just the Node backend wi
interic updated | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, valorant driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2, rust, apex, lege
hacking
chill ma hai
登录模块(基于Spring Security)
Enigma Solutions Discord server | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, valorant driver, cheats, hacks, hack, undetected, cracked, ud, external, internal, cs2,
Proof-of-concept of a Python multi-package monorepo managed using Hatch.
leaked fortnite cheat (paste) that payson was selling lol | fortnite cheat, fortnite driver, fortnite offsets, valorant offsets, valorant cheat, data pointer, data ptr, ioctl, offsets, driver, valorant driver, cheats, hacks, hack, undetected, cracked, ud,
networksecurity
Hardware Security Evaluation Tools
session
A proof concept mini project for learning about AWS CDK and CloudFormation. Resources used in the consistent hashing algortihm project can be deployed using this. This is an example of Infrastructure as Code (IaC).
Spring Boot com Spring Security | Banco MySQL
msft_cloud_security_diagram_v3
CyberSecurity
This is a certified ethical hacker practical exam course contents
A vehicle security system using buzzer, LTE module, and Bluetooth tech, controlled via Android app. Alerts for unauthorized key insertion, with GSM for SMS/Call features (4G). Remote activation/deactivation via smartphone. Enhances security and convenienc
Proof of concept tools for using cvelistv5
hack club boba drop
I have developed this prototype laser security alarm with the ESP32 Dev Module that starts a buzzer alarm and sends an email notification to your email address.
Apex Legends external cheat, hack, mod menu, wallhack, esp, aimbot, trigger bot, UFI driver.
Final Semester Project for Security & Cryptography. CLI tool to encrypt/decrypt an input file with DES/BlowFish/RSA
Threejs javascript proof of concept, using threejs to see if you can make 3d printables
Windows 10 online in a browser (this is not a emulator and is connected to an actual virtual machine. this very well works. you can install hacks, viruses and much more!). This is unfinished. expect more soon.
🌉 Babashka Pods for Elixir (Proof of Concept)
Ff I'd hack
fortnite cheat fortnite hack fortnite aim aimbot fortnite wh wallhack fortnite esp fortnite hack 2024
Network_Security
valorant cheat valorant hack valorant aimbot valorant wallhack valorant
This is a Proof of Concept (PoC) application of an “Image Annotation Service” where users can perform all the basic actions in order to upload an image and have it annotated.
SOT hack, Sea Of Thieves cheat, mod menu, Aimbot, ESP, UFI driver.
:)
� Charity Workshop Alert: Half-Day IoT Hacking for Beginners! ��
This repository contains signed firmware for bypassing security measures on Logitech C-U0007 dongles, enabling advanced functionality and customization.
Rust external cheat, hack, mod menu, wallhack, esp, aimbot, trigger bot, UFI driver.
The repository for Don Bosco Makati's Hack Club Website.
Python for ethical hackers
Roller Coin Bot , captcha , hack , farm bot , cheat , auto captcha , 2024
spring-security-oauth2 수강
SecurityApp
file-security
Security-and-Privacy-of-ML
PUBG external cheat, hack, mod menu, wallhack, esp, aimbot, trigger bot, UFI driver.
Leverage a decade of Windows Security Expertise at the Security Clearance NOC/DC level, implements a broad, cohesive group of hardening settings for Windows 10, 7, XP, for the average consumer to ensure mass privacy and security for the United States Civi
EndpointSecurityLab
Spring Security Test
Phasmophobia Cheat , Hack , Aimbot , Esp , Wallhack , WH , External Launcher That Uses Efi Drivers
App creating to learn more about android security
odysseus-security-api
Palworld Cheat , Hack , Aimbot , Esp , Wallhack , WH , External Launcher That Uses Efi Drivers
Just a overview of SpringbootSecurity with JWT Authentication
Your personal companion for Hack the Box, TryHackMe, and practicing Ethical Hacking! (Use responsibly.)
This is a documentation for web application security fundamentals
Honkai Star Rail Cheat , Hack , Aimbot , Esp , Wallhack , WH , External Launcher That Uses Efi Drivers
Proof of concept to fly ECHO drone with Web Bluetooth
GTA5 online, GTA V, GTA 5, Grand The Auto Five Mod menu, Hack, Cheat UFI Driver.
To compress json objects for saving in a database as well as decompressing data from a database. This is a proof-of-concept.
Hacker Rank Programs
Project The purpose of this project is to help the managers to manage all the amenities, maintain the services charges for the apartment amenities like for example gym, parking area, security charges
🚀Password Cracker Software Crack Passwords of ZIP and RAR folders! 💻Brute Force Passwords, Cracker, Stealer Password Hack. Brute Force RAR ZIP Passwords Bot Script. Easy password hacker cracker JOHN THE RIPPER HASHCAT
Proof of concept for a project that runs IaC commands in parallel.
Cyber-security
Hacking Console
Genshin Impact Cheat , Hack , Aimbot , Esp , Wallhack , Kill Aura , KillAura , Auto TP , External Launcher That Uses Efi Drivers
signature_validation
A Stream chat integration in Flutter app proof of concept based on stream_chat_flutter package by Stream.
Aviator hack
security-springboot
Implements a broad, cohesive group of hardening settings for OpenBSD using the latest recommendations from the developers. Includes logging tools, monitoring tools, OpenSMTPD security tools, advanced firewall configuration blocking all scanners and contag
earlyrise-security
Gather URLs from the Wayback Machine and extract parameters for fuzzing. This tool helps in identifying potential security vulnerabilities in web applications by collecting URLs from archived versions of websites and extracting parameters that can be used
🌉 Babashka Pods for Elixir (Proof of Concept)
A Security Enumeration Tool for Linux
SpringTaskSecurity
Hacking-Terminal
Fake Hacking Console
Security
INTEGRATING SECURITY COMPONENTS: A DEMONSTRATION, LITERATURE REVIEW, AND BENCHMARK STUDY OF SQL TOOLS IN WEB SECURITY
CRUD-system-with-security
Security
Chroma Icons like Mega Hack v7 Icon Effects!
Check out faculty.skitm.in, tailored for SKITM faculty to upload lecture notes. Developed with jQuery, Bootstrap, PHP, MySQL, Cloudflare Server, DigiCert for security, and supplemented with JavaScript and JSON, it facilitates efficient sharing of educatio
A site that looks liket eh pom-2 hacking game in Warframe
security-frontend
proof of concept for Hypothetical Scenario project
This repository documents the comprehensive analysis and response to simulated cybersecurity threats detected in AWS S3 HoneyBucket Logs. Utilizing a structured AWS IRP-DataAccess, the project showcases how data from AWS S3 HoneyBuckets can be leveraged t
Learning the basics to ethical hacking.
Best Hack Backend
HACKING Codes
valorant cheat valorant hack valorant aim aimbot fortnite wh wallhack fortnite esp valorant hack 2024
spring-boot-security-jwt-example
A platform for aggregating and curating the latest news, articles, and discussions in the tech industry. Similar to YCombinator's Hacker News, it will feature user-submitted content, community voting, and a focus on technology, startups, and innovation.
The AES-GCM Flutter Encryption Plugin provides seamless encryption and decryption functionality for Flutter applications using the AES-GCM (Advanced Encryption Standard - Galois/Counter Mode) algorithm. AES-GCM is a widely used encryption standard known
Este es Diagrama de Entidad y Relación que arrojo la creación de la base de datos hacks-logros.
My scripts for ethical hacking
rust cheat rust hack rust aim aimbot rust wh wallhack rust esp rust hack 2024
SP24 Hack Challenge for Cornell AppDev
Explore a versatile Python repository enabling seamless steganography across Text, Image, Audio, GIF, and Video formats.
Amiga Track Valley- Hack the Valley
Copilot-For-Security
It contains the steps to complete various activity in AWS cloud. Each practical contains a new task with the step by step procedure.
teaching security studends
This is a hands on & Free Ethical Hacking Course in Somali Language
Battlefield 2042 Cheat , Hack , Aimbot , Esp , Wallhack , WH , External Launcher That Uses Efi Drivers
Cod Warzone Cheat , Hack , Aimbot , Esp , Wallhack , WH , External Launcher That Uses Efi Drivers
Choose a programming language and application. Review the code for security vulnerabilities and provide recommendations for secure coding practices. Use tools like static code analyzers or manual code review.
Hack the Valley Workshop April 23 2024
Bitcoin Hacking , Crypto miner , bitcoin bruteforce , bitcoin wallet cracker , walletminer , btc miner , metamask recovery tool
Counter Strike 2 cheat, CS 2 hack, CS2 Aimbot, CS2 Bunnyhop, Faceit driver Cheat
Dayz Cheat , Hack , Aimbot , Esp , Wallhack , WH , External Launcher That Uses Efi Drivers
Access-EC2-instance-private-IP-from-the-external-network-using-VPN-AWS-OpenVPN-AWS-Security
EFT external cheat, hack, mod menu, wallhack, esp, aimbot, trigger bot, UFI driver.
In my Malware Analysis Lab, I conduct a demonstration of Static and Dynamic analysis methodologies using a diverse range of malware analysis tools. These include industry-standard utilities such s FLOSS, Ghidra, PEStudio, ProcDOT, Process Hacker 2, tcpvie
Basic REST SpringBoot application with spring security and JWT
Fortnite Cheat , Hack , Aimbot , Esp , Wallhack , WH , External Launcher That Uses Efi Drivers
Test scenario for a bunch of AI workload packages
Ein Skript um gegen Hacker in Age gewappnet zu sein. Es drückt in zufälligen Abständen 'F3' um das Spiel zu unterbrechen und so den Gegener zu nerven.
Here is tutorial about how to calibrate a camera using Zhang's Method. Furthermore we draw objects on the calibration images as a proof of concept for points mapping, from 3D to 2D
Developed a missile detection system for EESC 1021, addressing engineering challenge #12: Prevent Nuclear Terror. Integrated Arduino, light sensor, LED, buzzer, and OLED display to identify potential missile threats based on thruster emissions. Overcame t
Garrys Mod , Hack , Aimbot , Esp , Wallhack , WH , External Launcher That Uses Efi Drivers
BLUE LOCK PWC Mod 500K free blue gems Hacks guide
OSCAL (Open Security Controls and Assement Language) on an XProc3 platform
True Tech Hack by MTS
Software that allows high-ticket item store managers (e.g. jewelry boutiques) to review advanced data within their store such as: foot traffic at different times, likely customer paths, dwell times, queue times, employee closing rates, etc. by overlaying
This is a tool used by several security researchers to find Carriage Return Line Feed Injection Bug
This Repository contains the code for my Master-Thesis about Privacy and Security in SmartHomes.
Computer Security
CS-305-Software-Security
a simple hack tool
Security Control Framework Azure Policy
Computer And Network Security
the interface that interacts with the raspberry pi HACKING modules
A Simple Web MVC Project with JDK17, Spring Boot, Spring Security, Hibernate and JSTL
Sample code for GCP Security of AI
The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP systems, helping users identify security risks and vulnerabilities. With features like inputting SAP credentials, scanning
A simple proof of concept mod adding a few foods to MC, made using Fabric.
[READ-ONLY] Manage and let users manage Known Devices in Filament to enhance security
Proof-of-concept iOS app for estimating home prices. This project uses a custom trained CoreML model for home pricing and SwiftUI for layout. Assistance with CoreML and SwiftUI was provided by Copilot.
Mallorca crypto bot proof-of-concept for Decode Travel Hackathon
Madrid Hack and Jam primavera 2024
node-security-example-udemy
Cyber Weapons Lab contains All the repositories related to Ethical Hacking
Examen-Programmation-fonctionnel-security
Matrix Hack
A proof-of-concept of how a clinic might implement rounds.
Encontrarás varias fases del hacking ético como: Reconocimiento | Escanéo | Explotación | Persistencia | Escalada de Privelegios y Borrado de Huellas en temas como el Pivoting | Buffer-Overflow | Redes Wi-Fi | Forense y entre otros temás más..
Cyber Security project 1 exercise with a guestbook
CHECKING SECURITY PROPERTIES OF CLOUD SERVICE REST APIS
A hacking experience
Security solution to prevent screen capture in Flutter apps.
hack crash
Sistema de cadastro fullstack Angular 17+ Java/Spring JWT e Spring Security
CS556-CyberSecurity-Assignment-for-Worm-Progression
The project provides a secure alternative implementation of certain functions from the C standard library (LIBC), aiming to enhance security and mitigate common vulnerabilities by following the same logic and behavior as LIBC.
MySecurityResearch
Proof of concept for 3D splatoon-style splatter in GameMaker
Learn about authentication and security
Where 'signing up' feels like summoning unicorns 🚀, and 'signing in' is as easy as waving a wand! Embrace the magic of seamless registration and sign-in with our Go authentication API. Abracadabra, security sorted! 🧙‍♂️✨"
Cloud security malware transfer
Implemented a project for efficient handling and encryption of CAN frames, enhancing data security and anomaly detection using AES-GCM and ML models. Identified future enhancements for improved data transmission security contributing to 11% enhanced secur
This is a project where I have learned about MERN and created a simple login and sign up form with frontend, backend, database and JWT for security
A toolbox for differents security, math, url shortener and cipher. Made this web site with Django and PostgreSQL
A proof of concept for vanilla JS with TS-validated types
A proof-of-concept for an HTTPS certificate setup using either provided certificate pair or a generated, signed by a common self-signed CA, certificate pair.
proof of concept that i can make a discord knock off
Security Login with Jwt
RAT-Crack
Using KNN (K Nearest Neighbors) to build a proof of concept to a simple movie recommendation system :chart_with_upwards_trend:
SIG Proof Of Concept
Exploring Hacker News Posts
valorant hack free to use valorant cheat valorant aimbot valorant wallhack
Doctor Finder is a platform connecting patients and doctors. Patients search for doctors by specialty and location, book appointments, and pay online or offline. You'll build the .NET backend API ensuring data security, appointment management, and scalabi
A Git Hub repository including the code and description of creating a proof of concept for Energy Forecasting.
A demonstration for my assignment on Cyber Security course
Assignment for the Security in Software Applications course at Sapienza University of Rome, a.y. 2023/2024
Hack bet games
Hands-on Activity 13.1 - Security Automation
用 Hacker News API 做個簡單網站 範例 (.NET 8 MVC)
Spring Security simplest implementation
Spring-Security
springboot-security
info-security-workshop
FortiGate is the world's most deployed network firewall, delivering networking and security capabilities in a single platform, managed by FortiGate Cloud.Master the art of Fortigate Firewall with our free comprehensive guide on GitHub! From interface conf
PP_3_1_2_Spring_security
An open-source Django e-commerce project designed for scalable and customizable online stores. It offers robust features, strong security, and community-driven support for developers and businesses alike
Unleash the power of secure passwords with our intuitive generator! Craft personalized passwords tailored to your unique needs. Safeguard your digital world with ease and confidence. Get started now and take control of your online security journey! 🛡️🔐
BEST Hack 2024 https://clck.ru/3AE5P2
Linux-security-script-2
Personal blog -> Random thoughts on mathematics, cryptography and data security.
Crop yield prediction involves estimating the amount of crops that will be harvested from a particular area in a given growing season. This prediction is crucial for farmers, agricultural organizations, and policymakers to make informed decisions regardin
Restful CRUD Employee Assessment Service API using Spring Boot, Spring Security, JWT, PostgreSQL, JPA, Custom Exception handling, Ratelimiter - Resilience4j, Javax.validation.
A Minecraft 1.20.2 Hacked Client
newtwork_security_project
This project involved developing a machine learning-based intrusion detection system with my team, following the CRISP-DM methodology. We used Python and Jupyter Notebook for implementation, conducted data preprocessing, model training, and evaluation to
Official webpages for Juara Security's company profile and learning management system
O Fórum White Hat é um site organizado em tópicos onde você tira dúvidas sobre diversas áreas do hacking, encontra diversos tutoriais faz networking e aprende na marra com quem já chegou onde você quer chegar.
Project for LA Hacks 2024
Smart Contract Audit Reports
Information about how to configure email servers, services, etc.
cyber-security-system-knoxaurora-
Spring Boot3.2.2 기반 Spring Security 학습을 위한 프로젝트
Botium Toys: Scope, goals, and risk assessment report
Web app to check for deprecations in libraries & security advisories
ObsidianOS is an Arch-based Linux distribution that focuses on privacy, security, stability, and ease of use.
Let's Decode the Dark web links 2024, Fortify Digital Frontiers 🛡️. Join the Quest for Security and Innovation! 🌐 #CyberSecurity #DarkWebExploration #DigitalDefense #CodingExpert #Encryption #DataProtection #TechInnovation #SecureCoding #WebSecurity #Myst
Taykon Web Server core, a seamless web server focused on security.
Spring-Security-Basic
Just a Proof of concept of Agora.io for real time comunication
osi-security
These are the contracts to be used to demonstrate IPSChain hack prevention capability
reversinglabs-MicrosoftCopilotForSecurity-content
Quiz in ReactJs and Java with Spring Security, Spring Boot and Spring Rest.
An ACM Hack workshop on CSS animations!
springSecurity
Website for API Security Village - BSides SF
Java SpringBoot application with JWT based Authentication and MySQL CRUD operations
Proof of concept showcasing how our legacy apps (widgets) can work together with our newer apps (journeys) via Module Federation.
Laser security system for ECE 4180 final project
Enhance security across servers utilizing the AuthMe plugin
Hack Note 是一个全面的网络安全文档,旨在提供一份详尽且实用的指南,帮助理解和应用各种网络安全技术。
spring-security-registration-with-angular
spring boot , postman , postgresql , spring security
Defraud is a tool to help you identify and avoid scams
24 Deadly Sins of Software Security
Hello worl! my name is Tomasz Wierzbicki, this is my pentesting portfolio and my offensive security findings shared online. You can find CTF's writeups, notes, my methodologies, general notes e.t.c. Feel free to use it!
Welcome to *tup, a tool to optimize the start-up in Linux envoirments, feel free to change what do you want, happy coding and/or hacking!
A spring security quickstart tutorial, protect a demo api by form login
proyecto1-spring-security
MobileSecuritySoftware
CloudGoat scenario focused on unprotected EC2 snapshots. Simulates an IAM user exploiting a misconfigured Lambda to restore restricted snapshots, highlighting risks of excessive permissions and the need for least privilege principles in cloud security.
An enterprise web application for managing ADS’s Dental Surgery Operation Appointment. A backend web API using Spring Boot, Spring Security, Spring AOP and TDD.
A versatile password generator offering real-time strength indication and customizable length and character options for enhanced security.
Modeling and analysis of IAM security policies
Angular project for hack-a-thon
Hack Scripts
Simple VPN project for CS364 Network Security
Official repository of NetWatch- wrapper for accessing hardware security modules (HSM) on Android Devices
UnmannedStoreSecuritySystem
Hacker Rank Functions
This is based on ZephyFoxy's .zshrc file. I added lolcat and some other fun stuff you might like. You still get the eth0, tun0. wlan0 and I added the Virtual Hacking Lab's ppp0.
Projects related to my MEng ISS program at Concordia University, showcasing work in information systems security, cryptography, network security, and cybersecurity strategies.
Kumpulan Beberapa Materi Yang Di Dapat Dari Berbagai Sumber
VM Translator from The Jack language VM code to The Hack language assembly code as part of the Nand to Tetris course
SecurityOnCloud
This repository contains C laboratory works in the discipline of information security basics
hacking lib
Welcome to our comprehensive Free Cisco ASA Firewall Training – the ultimate guide to mastering the art of network security. Whether you're a beginner looking to understand the basics or an experienced professional seeking advanced configurations, our han
Security2
security-tutorial
Security
A validator for gradle/wrapper jar binaries, intended to be used in CI pipelines.
Here are some projects that I have done during the training in Mobile Security
WARNING: This is a proof-of-concept idea - it might be removed again
Frida script designed to bypass or re-pin certificate pinning in Android applications. Certificate pinning is a security mechanism used by applications to verify that the server's SSL certificate presented during the TLS handshake matches a predefined cer
WiFi-Security-Behaviour-Enhancing-Curriculum
Cloud operations platform
LEAD Global Food Security Website
Group project
Java | Spring Boot | Spring Security | Spring Cloud | Spring Validation | JPA/Hibernate | RabbitMQ | Feign Client | PostgreSQL | Docker
LP-II, (information security) Practicals TE Computer SPPU
Welcome to my Security Audit Repository! Here, you'll find a collection of security audit reports conducted by me
python-for-hacking
GPM Panel Free Fire AIMBOT ANTIBAN Hack MAWI / @mawi.man.369
Gatekeeper-Guard-of-Security
Security_of_Health_Care_Data
Public source code for DS Demake project. This hack aims to import the new levels from SM64 DS into the original game. It is N64 Compatible.
Dynamic SSL certificate management leveraging the ACME protocol, designed for direct API accessibility within applications. Automates certificate creation, renewal, and retrieval, ideal for distributed applications requiring real-time, secure certificate
A blazingly-fast, hackable linter
Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.
spring-security
a new rtl-sdr source for sdr++ with librtlsdr/librtlsdr and it implements the r820/t2 tuner hack and manual controls.
The official LumiOS, with games, hacks and more.
QR-Security
Install and configure vault_auditdevice on your system.
🛡️ Cybersecurity Enthusiast | Ethical Hacker | InfoSec Researcher 🌐 | Passionate about securing digital landscapes and enhancing online privacy. Check out my projects for insights into ethical hacking, penetration testing, and cybersecurity best practices
Offensive Penetration Testing and Red Teamer methodologies, documentation & scripts.
Brazilian repo
In this Repo, we will walk throught Security Video Camera processing and License plate Tracking.
dope-security
Backend de un Portal de necesidades, creado en Node.js, para Hack a Boss
UWB Hacks 24
Online module of the Sallet universe. Low level, advanced Bitcoin wallet handling public data only. Coin selection, token management, gateway to an airgapped SKULL unit.
Security Reference
SIEM detection format for javascript objects based on sigma logfile rules.
Hacking together a rouguelike in C# using Monogame
This repository includes examples from the blog Consolidando with the label "Spring Boot"
hacking
Starter for setting up security in a Spring web service
Proof Of Concept for te NetScaler Vuln
A comprehensive hacking cheat sheet
CSSS Fall Hacks 2023
This is a hack for Blooket.
Internet without harassment by ads company!
Proof of concept about deploying cellxgene instances on a kubernetes cluster
Open form hack for GitHub Copilot
This repo is for my notes, exmaples, demos, and proof of concepts.
proof-of-concept custom server for SEGA SPLASH! GOLF
A very secure authentication / account system for NodeJS with a modern style.
Hack 2 build generative AI Demo
Proof of concept for a game framework with included editor
Proof of Concept script created as a solution to one of the Amazon Internship Tests
Security Framework for Mobile Linux
A proof of concept detached police database for FiveM to reduce reliance on Google Docs
Significant security enchancements of recent major Android versions.
Proof-of-concept implementation of collaborative GKR and a collaborative zk-SNARK with fully distributed proof generation.
This directory contains all the learning i have in DSA and Development.
An incentivized crowd-sourcing platform to train LLM's with Bitcoin. Bitcoin-PAL is our proof of concept.
System-Security
Quantum-CODEX is a proof-of-concept WebApp, CLI and API for sharing, archiving, and annotating computational materials science projects.
Proof of concept that harvests local decision using linked traversal
By this point in time, if you're aren't making your own AI assistant. What are you doing? Use this as a template to build on. All the code is just a suggestion. Use other AI models to build it for you. Just feed terminal_assistant into whatever LLM (AI) y
Scheme, Racket hacks for functionality that's taking me too long to find in existing modules
Use generative ML to design new proteins using this simple, hackable implementation of protein transformer models
An innovative take on the classic sliding puzzle game. Initially created for the Flutter Puzzle Hack.
A browser extension that allows you to highlight, tag, annotate, and export the best parts of your favorite YouTube videos and summarize these snips with the power of AI. Winner of Boost Hacks
Proof of Concept for a font based authentication method
this repo contains all the problems solved by me on Hacker Earch
VulNyx is a free platform for hackers where you can learn & practice cybersecurity with our vulnerable virtual machines.
A web-based scouting proof of concept for 1810
API written in C# for a small travel agency, ensuring seamless data communication between the database and the front-end while emphasizing security and user authentication.
General purpose Discord Bot with the hacker in mind
A Next Generation Advanced Group Management Bot written in telethon and pyrogram along with MongoDb and Sql Database which will Help In Managing Of Your Group
Some basic tools in Cyber Security
Radare2 snap and docker repository
Configure vault_snapshot on Vault.
Proof of concept illustrating a sample implementation of wasmCloud-based distributed rating
🧵 CLI tool for directly patching container images using reports from vulnerability scanners
Simulate hacking.
An open API service providing security vulnerability metadata for many open source software ecosystems.
A simple android note app made by jetpack compose.
Hack the system!
security-workflows
CTI Teams Bot for Security Tapestry
Vulnerable demo application for testing with application security solutions.
A pkmn ruby hack rom about D'Avack
Proof of Concept of Multiplayer Game
The Agda mechanization of a gradual security-typed programming language with general mutable references.
Call for papers / accepted papers in top computer security and deep learning fields.
Small Antivirus written in Python
My personal GTD tools and hacks.
Trends Website (URL) from Twitter hackers.
The best hacks for Pixel Strike 3D (PS3D) you can find.
This repository contains information, labs, and proof of concept
👨🏻‍💻 A Hands-on Approach to Hacking Coding Interviews
GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).
A high performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar
Elastic Security detection content for Endpoint
Replication package for The Power of Tests for Detecting p-Hacking
Security Catch and Release Automation Manager
Machine Learning in Cyber Security Symposium at Imperial College London
awesome game security [Welcome to PR]
An open source tool focused on software supply chain security. 墨菲安全专注于软件供应链安全,具备专业的软件成分分析(SCA)、漏洞检测、专业漏洞库。
SecTester is a new tool that integrates our enterprise-grade scan engine directly into your unit tests.
This project uses JWT and Spring security to implement security (Back-End app)
AZ500-AzureSecurityTechnologies.zh-cn
Code that goes along with the Hacks, Leaks, and Revelations book
A novel Android app store focused on security, privacy, and usability
End-to-end proof of concept showing core MLOps practices to develop, deploy and monitor a machine learning model for online inference scenarios using Databricks and Kubernetes on Microsoft Azure.
OSIDB — Open Security Issue Database
AZ500-AzureSecurityTechnologies.es-es
Yet another Implementation/clone of y combinator hacker news
Automagically filter URLs with Bug Bounty program scope rules scraped from the internet.
Certified Ethical Hacker
企业级快速开发平台,前后端分离设计,基于SpringBoot2.x、SpringCloud、Spring Security,MyBatis-plus,Vue,在线代码生成器快速生成前后端CRUD代码,支持单体服务与微服务之间灵活切换、帮助开发者节省70%的重复工作,更专注业务,节省开发成本,100%开源。
aws-security-hub
Home Assistant integration to manage Eufy Security devices as cameras, home base stations, doorbells, motion and contact sensors.
Security Audit reports by BlockApex
A proof of concept tool being developed for my master's degree
code samples to accompany the tanzu proof of concept guide (https://core.vmware.com/resource/tanzu-proof-concept-guide)
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
Low-Level Software Security for Compiler Developers
A proof-of-concept WordPress plugin fuzzer
HackingNotes
A very small, very simple, yet very secure encryption tool.
Seiso's Grand Opinionated AutoTester (GOAT)
Protect your SIP Servers from bad actors at https://sentrypeer.org
ETİK HACKER EL KİTABI #1 KENDİMİ SİBER GÜVENLİK ALANINDA GELİŞTİRMEYE ÇALIŞIYORUM VE BU ZAMAN İÇİNDE ELİME GEÇEN HER ŞEYİ DEĞERLENDİRMEYE ÇALIŞAN BİRİSİYİM, KENDİ YAPTIGIM, REFERANS OLARAK ALDIĞIM(İNTERNET ÜZERİNDE PUBLİC OLARAK PAYLAŞILMIŞ OLDUKLARI İÇİN
Very basic proof of concept container in C++ based on Lizzie Dixon's great C example.
The Next generation of cloud management and security
Proof of concept for building a Rust program for MS-DOS
Postdoctoral researcher, Emacs enthusiast, Japanese language learner
Public documentation for boltopspro/vpc-secure
superwerker can help you get started with the AWS Cloud quickly without investing in consultants or devoting time to extensive research. superwerker is a free, open-source solution that lets you quickly set up an AWS Cloud environment following best pract
:closed_lock_with_key: AWS Security Group Management Lambda :closed_lock_with_key:
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
为了更好地管理博客文章,分享更好的知识,该系列资源为作者CSDN博客的备份文件。本资源为网络安全自学篇,包括作者安全工具利用、Web渗透、系统安全、CVE漏洞复现、安全论文及会议等知识,希望对您有所帮助!一起加油。
security-tokens
Boundary enables identity-based access management for dynamic infrastructure.
Security hardening content for VMware solutions to US Department of Defense standards
PGP keys map to maven artifacts
Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel CVE debug.
kujira-spring-security
Kubernetes networking based on Open vSwitch
Hack Club's PostgreSQL-based shortlink router. Now running serverlessly!
Abuse the gosum database to store verifiable hashes about any binary file
An open-source USB security token powered by STM32
🐳 VMs are bloat. Dockerise your CTF environment.
Linux, macOS and Windows Install scripts for cnquery & cnspec
0xmachos.github.io
My notes and codes for hacking Nintendo 64 games with the Gameshark
rfid door lock security access control system using Mifare PN532 and Beaglebone black.
PHP 7/8-friendly alternative to the official php-yubico client
A toolbox based on powsybl framework dedicated to power systems coordinated capacity calculation and security analysis projects
Misc utilities for hacking
An OAuth2 and OpenID Connect Debugger
Runtime data collection for the StackRox Kubernetes Security Platform using eBPF
In this repo I retype Graham and Dodd's Security Analysis
Restart of translation for openSUSE manuals...
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook,
Spring Boot Security Examples
Automated Adversary Emulation Platform
:hammer: Build tools responsible for assembling https://github.com/Roave/SecurityAdvisories/blob/master/composer.json
a proof of concept for a game
WordPress password authentication for the modern era
Linux client for eduVPN
Security advisory database for Rust crates published through crates.io
Node.js Ecosystem Security Working Group
☕️ exprexo - hacked javascript freshly served
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Hack language & HHVM debugger support for Visual Studio Code
OpenZeppelin Contracts is a library for secure smart contract development.
Snyk CLI scans and monitors your projects for security vulnerabilities.
Website about IT security and kimchi.
🦕 A collection of Orpheus (Hack Club's mascot) drawings! Look at them at rawr.hackclub.com :)
🍯 T-Pot - The All In One Honeypot Platform 🐝
A low-interaction SSH honeypot written in C
wolfSSL layer for OpenEmbedded and Yocto, containing product recipes, examples, and bbappend files.
"TYPO3 Explained": Main TYPO3 Core Document: Main classes, Security, TypoScript syntax, Extension API and much more
Proof of Concept and Research repository.
Proof of Concept: Jenkins deploys docker containers after source code change of a Scala/Java web-app
DOMPurify - a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMPurify works with a secure default, but offers a lot of configurability and hooks. Demo:
Free Elasticsearch security plugin and Kibana security plugin: super-easy Kibana multi-tenancy, Encryption, Authentication, Authorization, Auditing
Hacker News facebook bot
the TCPdump network dissector
Proof of concept for Convey pattern for small software design & usable libraries adapt for Convey pattern
The Leading Security Assessment Framework for Android.
CVE-2022-48682 -- In deletefiles in FDUPES before 2.2.0, a TOCTOU race condition allows arbitrary file deletion via a symlink.
CVE-2023-47252 -- An issue was discovered in PnpSmm in Insyde InsydeH2O with kernel 5.0 through 5.6. There is a possible out-of-bounds access in the SMM communication buffer, leading to tampering. The PNP-related SMI sub-functions do not verify data size before getting it
CVE-2024-22632 -- Setor Informatica Sistema Inteligente para Laboratorios (S.I.L.) 388 was discovered to contain a remote code execution (RCE) vulnerability via the hmsg parameter. This vulnerability is triggered via a crafted POST request.
CVE-2024-22633 -- Setor Informatica Sistema Inteligente para Laboratorios (S.I.L.) 388 was discovered to contain a remote code execution (RCE) vulnerability via the hprinter parameter. This vulnerability is triggered via a crafted POST request.
CVE-2024-3154 -- A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system.
CVE-2024-31755 -- cJSON v1.7.17 was discovered to contain a segmentation violation, which can trigger through the second parameter of function cJSON_SetValuestring at cJSON.c.
CVE-2024-32404 -- Server-Side Template Injection (SSTI) vulnerability in inducer relate before v.2024.1, allows remote attackers to execute arbitrary code via a crafted payload to the Markup Sandbox feature.
CVE-2024-32406 -- Server-Side Template Injection (SSTI) vulnerability in inducer relate before v.2024.1 allows a remote attacker to execute arbitrary code via a crafted payload to the Batch-Issue Exam Tickets function.
CVE-2024-32651 -- changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can ru
CVE-2024-32868 -- ZITADEL provides users the possibility to use Time-based One-Time-Password (TOTP) and One-Time-Password (OTP) through SMS and Email. While ZITADEL already gives administrators the option to define a `Lockout Policy` with a maximum amount of failed passwor
CVE-2024-33661 -- Portainer before 2.20.0 allows redirects when the target is not index.yaml.
CVE-2024-33663 -- python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key formats. This is similar to CVE-2022-29217.
CVE-2024-33664 -- python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319.
CVE-2024-33665 -- angular-translate through 2.19.1 allows XSS via a crafted key that is used by the translate directive. NOTE: the vendor indicates that there is no documentation indicating that a key is supposed to be safe against XSS attacks.
CVE-2024-33666 -- An issue was discovered in Zammad before 6.3.0. Users with customer access to a ticket could have accessed time accounting details of this ticket via the API. This data should be available only to agents.
CVE-2024-33667 -- An issue was discovered in Zammad before 6.3.0. An authenticated agent could perform a remote Denial of Service attack by calling an endpoint that accepts a generic method name, which was not properly sanitized against an allowlist.
CVE-2024-33668 -- An issue was discovered in Zammad before 6.3.0. The Zammad Upload Cache uses insecure, partially guessable FormIDs to identify content. An attacker could try to brute force them to upload malicious content to article drafts they have no access to.
CVE-2024-33669 -- An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS querie
CVE-2024-33670 -- Passbolt API before 4.6.2 allows HTML injection in a URL parameter, resulting in custom content being displayed when a user visits the crafted URL. Although the injected content is not executed as JavaScript due to Content Security Policy (CSP) restrictio
CVE-2024-33671 -- An issue was discovered in Veritas Backup Exec before 22.2 HotFix 917391. The Backup Exec Deduplication Multi-threaded Streaming Agent can be leveraged to perform arbitrary file deletion on protected files.
CVE-2024-33672 -- An issue was discovered in Veritas NetBackup before 10.4. The Multi-Threaded Agent used in NetBackup can be leveraged to perform arbitrary file deletion on protected files.
CVE-2024-33673 -- An issue was discovered in Veritas Backup Exec before 22.2 HotFix 917391. Improper access controls allow for DLL Hijacking in the Windows DLL Search path.
CVE-2024-4163 -- The Skylab IGX IIoT Gateway allowed users to connect to it via a limited shell terminal (IGX). However, it was discovered that the process was running under root privileges. This allowed the attacker to read, write, and modify any file in the operating sy
CVE-2022-36029 -- Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue.
CVE-2023-3597 -- A flaw was found in Keycloak, where it does not correctly validate its client step-up authentication in org.keycloak.authentication. This flaw allows a remote user authenticated with a password to register a false second authentication factor along with a
CVE-2023-51478 -- Improper Authentication vulnerability in Abdul Hakeem Build App Online allows Privilege Escalation.This issue affects Build App Online: from n/a through 1.0.19.
CVE-2023-51482 -- Improper Authentication vulnerability in EazyPlugins Eazy Plugin Manager allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Eazy Plugin Manager: from n/a through 4.1.2.
CVE-2023-51484 -- Improper Authentication vulnerability in wp-buy Login as User or Customer (User Switching) allows Privilege Escalation.This issue affects Login as User or Customer (User Switching): from n/a through 3.8.
CVE-2023-52220 -- Missing Authorization vulnerability in MonsterInsights Google Analytics by Monster Insights.This issue affects Google Analytics by Monster Insights: from n/a through 8.21.0.
CVE-2023-5675 -- A flaw was found in Quarkus. When a Quarkus RestEasy Classic or Reactive JAX-RS endpoint has its methods declared in the abstract Java class or customized by Quarkus extensions using the annotation processor, the authorization of these methods will not be
CVE-2023-6237 -- Issue summary: Checking excessively long invalid RSA public keys may take
CVE-2023-6484 -- A log injection flaw was found in Keycloak. A text string may be injected through the authentication form when using the WebAuthn authentication mode. This issue may have a minor impact to the logs integrity.
CVE-2023-6544 -- A flaw was found in the Keycloak package. This issue occurs due to a permissive regular expression hardcoded for filtering which allows hosts to register a dynamic client. A malicious user with enough information about the environment could jeopardize an
CVE-2023-6596 -- An incomplete fix was shipped for the Rapid Reset (CVE-2023-44487/CVE-2023-39325) vulnerability for an OpenShift Containers.
CVE-2023-6717 -- A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a ma
CVE-2023-6787 -- A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "prompt
CVE-2024-0874 -- A flaw was found in coredns. This issue could lead to invalid cache entries returning due to incorrectly implemented caching.
CVE-2024-0916 -- Unauthenticated file upload allows remote code execution.
CVE-2024-1102 -- A vulnerability was found in jberet-core logging. An exception in 'dbProperties' might display user credentials such as the username and password for the database-connection.
CVE-2024-1139 -- A credentials leak vulnerability was found in the cluster monitoring operator in OCP. This issue may allow a remote attacker who has basic login credentials to check the pod manifest to discover a repository pull secret.
CVE-2024-1347 -- An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker through a crafted email address may
CVE-2024-1657 -- A flaw was found in the ansible automation platform. An insecure WebSocket connection was being used in installation from the Ansible rulebook EDA server. An attacker that has access to any machine in the CIDR block could download all rulebook data from t
CVE-2024-1726 -- A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurat
CVE-2024-22144 -- Improper Control of Generation of Code ('Code Injection') vulnerability in Eli Scheetz Anti-Malware Security and Brute-Force Firewall gotmls allows Code Injection.This issue affects Anti-Malware Security and Brute-Force Firewall: from n/a through 4.21.96.
CVE-2024-22373 -- An out-of-bounds write vulnerability exists in the JPEG2000Codec::DecodeByStreamsCommon functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to a heap buffer overflow. An attacker can provide a malicious file
CVE-2024-22391 -- A heap-based buffer overflow vulnerability exists in the LookupTable::SetLUT functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger t
CVE-2024-2434 -- An issue has been discovered in GitLab affecting all versions of GitLab CE/EE 16.9 prior to 16.9.6, 16.10 prior to 16.10.4, and 16.11 prior to 16.11.1 where path traversal could lead to DoS and restricted file read.
CVE-2024-2467 -- A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a
CVE-2024-25026 -- IBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.4 are vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to c
CVE-2024-25569 -- An out-of-bounds read vulnerability exists in the RAWCodec::DecodeBytes functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to an out-of-bounds read. An attacker can provide a malicious file to trigger this v
CVE-2024-25583 -- A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected.
CVE-2024-25624 -- Iris is a web collaborative platform aiming to help incident responders sharing technical details during investigations. Due to an improper setup of Jinja2 environment, reports generation in `iris-web` is prone to a Server Side Template Injection (SSTI).
CVE-2024-25917 -- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in CodeRevolution WP Setup Wizard.This issue affects WP Setup Wizard: from n/a through 1.0.8.1.
CVE-2024-28240 -- The GLPI Agent is a generic management agent. A vulnerability that only affects GLPI-Agent installed on windows via MSI packaging can allow a local user to cause denial of agent service by replacing GLPI server url with a wrong url or disabling the servic
CVE-2024-28241 -- The GLPI Agent is a generic management agent. Prior to version 1.7.2, a local user can modify GLPI-Agent code or used DLLs to modify agent logic and even gain higher privileges. Users should upgrade to GLPI-Agent 1.7.2 to receive a patch. As a workaround,
CVE-2024-2829 -- An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.5 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. A crafted wildcard filter in FileFinder may lead to a d
CVE-2024-2905 -- A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potent
CVE-2024-2907 -- The AGCA WordPress plugin before 7.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for exam
CVE-2024-29205 -- An Improper Check for Unusual or Exceptional Conditions vulnerability in the web component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows a remote unauthenticated attacker to send specially crafted requests in-order-to ca
CVE-2024-29660 -- Cross Site Scripting vulnerability in DedeCMS v.5.7 allows a local attacker to execute arbitrary code via a crafted payload to the stepselect_main.php component.
CVE-2024-30560 -- Cross-Site Request Forgery (CSRF) vulnerability in ??WP DX-Watermark.This issue affects DX-Watermark: from n/a through 1.0.4.
CVE-2024-30890 -- Cross Site Scripting vulnerability in ED01-CMS v.1.0 allows an attacker to obtain sensitive information via the categories.php component.
CVE-2024-30939 -- An issue discovered in Yealink VP59 Teams Editions with firmware version 91.15.0.118 allows a physically proximate attacker to gain control of an account via a flaw in the factory reset procedure.
CVE-2024-31266 -- Improper Control of Generation of Code ('Code Injection') vulnerability in AlgolPlus Advanced Order Export For WooCommerce allows Code Injection.This issue affects Advanced Order Export For WooCommerce: from n/a through 3.4.4.
CVE-2024-31574 -- Cross Site Scripting vulnerability in TWCMS v.2.6 allows a local attacker to execute arbitrary code via a crafted script
CVE-2024-31609 -- Cross Site Scripting (XSS) vulnerability in BOSSCMS v3.10 allows attackers to run arbitrary code via the header code and footer code fields in code configuration.
CVE-2024-31610 -- File Upload vulnerability in the function for employees to upload avatars in Code-Projects Simple School Management System v1.0 allows attackers to run arbitrary code via upload of crafted file.
CVE-2024-31615 -- ThinkCMF 6.0.9 is vulnerable to File upload via UeditorController.php.
CVE-2024-32236 -- An issue in CmsEasy v.7.7 and before allows a remote attacker to obtain sensitive information via the update function in the index.php component.
CVE-2024-32324 -- Buffer Overflow vulnerability in Shenzhen Libituo Technology Co., Ltd LBT-T300-T400 v.3.2 allows a local attacker to execute arbitrary code via the vpn_client_ip variable of the config_vpn_pptp function in rc program.
CVE-2024-32358 -- An issue in Jpress v.5.1.0 allows a remote attacker to execute arbitrary code via a crafted script to the custom plug-in module function.
CVE-2024-32467 -- MeterSphere is an open source continuous testing platform. Prior to version 2.10.14-lts, members without space permissions can view member information from other workspaces beyond their authority. Version 2.10.14-lts fixes this issue.
CVE-2024-32481 -- Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in version 0.3.8 and prior to version 0.4.0b1, when looping over a `range` of the form `range(start, start + N)`, if `start` is negative, the execution will always reve
CVE-2024-32645 -- Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, incorrect values can be logged when `raw_log` builtin is called with memory or storage arguments to be used as topics. A contract search was perfor
CVE-2024-32646 -- Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `slice` builtin can result in a double eval vulnerability when the buffer argument is either `msg.data`, `self.code` or `<address>.code`
CVE-2024-32647 -- Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `create_from_blueprint` builtin can result in a double eval vulnerability when `raw_args=True` and the `args` argument has side-effects.
CVE-2024-32648 -- Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to version 0.3.0, default functions don't respect nonreentrancy keys and the lock isn't emitted. No vulnerable production contracts were found. Additionally, using a lock
CVE-2024-32649 -- Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `sqrt` builtin can result in double eval vulnerability when the argument has side-effects. It can be seen that the `build_IR` function of
CVE-2024-3265 -- The Advanced Search WordPress plugin through 1.1.6 does not properly escape parameters appended to an SQL query, making it possible for users with the administrator role to conduct SQL Injection attacks in the context of a multisite WordPress configuratio
CVE-2024-32676 -- Improper Restriction of Excessive Authentication Attempts vulnerability in LoginPress LoginPress Pro.This issue affects LoginPress Pro: from n/a before 3.0.0.
CVE-2024-32961 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative Themes HQ Blocksy allows Stored XSS.This issue affects Blocksy: from n/a through 2.0.33.
CVE-2024-33247 -- Sourcecodester Employee Task Management System v1.0 is vulnerable to SQL Injection via admin-manage-user.php.
CVE-2024-33592 -- Server-Side Request Forgery (SSRF) vulnerability in SoftLab Radio Player.This issue affects Radio Player: from n/a through 2.0.73.
CVE-2024-3508 -- A flaw was found in Bombastic, which allows authenticated users to upload compressed (bzip2 or zstd) SBOMs. The API endpoint verifies the presence of some fields and values in the JSON. To perform this verification, the uploaded file must first be decompr
CVE-2024-3622 -- A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the
CVE-2024-3623 -- A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registr
CVE-2024-3624 -- A flaw was found in how Quay's database is stored in plain-text in mirror-registry on the jinja's config.yaml file. This flaw allows a malicious actor with access to this file to gain access to Quay's database.
CVE-2024-3625 -- A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registry on Jinja's config.yaml file. This issue leaves the possibility of a malicious actor with access to this file to gain access to Quay's Redis instance.
CVE-2024-3730 -- The Simple Membership plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'swpm_paypal_subscription_cancel_link' shortcode in all versions up to, and including, 4.4.3 due to insufficient input sanitization and output escapin
CVE-2024-3733 -- The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.9.15 via the ajax_load_more() , eael_woo_pagin
CVE-2024-3893 -- The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the rtcl_fb_gallery_image_delete AJAX action in all versions up to, and including, 3.0
CVE-2024-3929 -- The Content Views – Post Grid & Filter, Recent Posts, Category Posts, & More (Gutenberg Blocks and Shortcode) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Widget Post Overlay block in all versions up to, and including, 3.7.0
CVE-2024-3988 -- The Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Sina Fancy Text Widget in all versi
CVE-2024-3994 -- The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tutor_instructor_list' shortcode in all versions up to, and including, 2.6.2 due to insufficient input sanitization an
CVE-2024-4006 -- An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1 where personal access scopes were not honored by GraphQL
CVE-2024-4024 -- An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.8 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker with their Bitbuck
CVE-2024-4035 -- The Photo Gallery – GT3 Image Gallery & Gutenberg Block Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alt text in all versions up to, and including, 2.7.7.21 due to insufficient input sanitization and output escaping.
CVE-2024-4077 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AndonDesign UDesign allows Reflected XSS.This issue affects UDesign: from n/a through 4.7.3.
CVE-2024-4161 -- In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received
CVE-2024-4164 -- A vulnerability, which was classified as critical, has been found in Tenda G3 15.11.0.17(9502). This issue affects the function formModifyPppAuthWhiteMac of the file /goform/ModifyPppAuthWhiteMac. The manipulation of the argument pppoeServerWhiteMacIndex
CVE-2024-4165 -- A vulnerability, which was classified as critical, was found in Tenda G3 15.11.0.17(9502). Affected is the function modifyDhcpRule of the file /goform/modifyDhcpRule. The manipulation of the argument bindDhcpIndex leads to stack-based buffer overflow. It
CVE-2024-4166 -- A vulnerability has been found in Tenda 4G300 1.01.42 and classified as critical. Affected by this vulnerability is the function sub_41E858. The manipulation of the argument GO/page leads to stack-based buffer overflow. The attack can be launched remotely
CVE-2024-4167 -- A vulnerability was found in Tenda 4G300 1.01.42 and classified as critical. Affected by this issue is the function sub_422AA4. The manipulation of the argument year/month/day/hour/minute/second leads to stack-based buffer overflow. The attack may be laun
CVE-2024-4168 -- A vulnerability was found in Tenda 4G300 1.01.42. It has been classified as critical. This affects the function sub_4260F0. The manipulation of the argument upfilen leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The
CVE-2024-4169 -- A vulnerability was found in Tenda 4G300 1.01.42. It has been declared as critical. This vulnerability affects the function sub_42775C/sub_4279CC. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remo
CVE-2024-4170 -- A vulnerability was found in Tenda 4G300 1.01.42. It has been rated as critical. This issue affects the function sub_429A30. The manipulation of the argument list1 leads to stack-based buffer overflow. The attack may be initiated remotely. The identifier
CVE-2024-4171 -- A vulnerability classified as critical has been found in Tenda W30E 1.0/1.0.1.25. Affected is the function fromWizardHandle of the file /goform/WizardHandle. The manipulation of the argument PPW leads to stack-based buffer overflow. It is possible to laun
CVE-2024-4172 -- A vulnerability classified as problematic was found in idcCMS 1.35. Affected by this vulnerability is an unknown functionality of the file /admin/admin_cl.php?mudi=revPwd. The manipulation leads to cross-site request forgery. The attack can be launched re
CVE-2024-4174 -- Cross-Site Scripting (XSS) vulnerability in Hyperion Web Server affecting version 2.0.15. This vulnerability could allow an attacker to execute malicious Javascript code on the client by injecting that code into the URL.
CVE-2024-4175 -- Unicode transformation vulnerability in Hyperion affecting version 2.0.15. This vulnerability could allow an attacker to send a malicious payload with Unicode characters that will be replaced by ASCII characters.
CVE-2022-45852 -- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in FormAssembly / Drew Buschhorn WP-FormAssembly allows Path Traversal.This issue affects WP-FormAssembly: from n/a through 2.0.5.
CVE-2023-20249 -- A vulnerability in the web-based management interface of Cisco TelePresence Management Suite (TMS) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is
CVE-2023-23976 -- Incorrect Default Permissions vulnerability in Metagauss RegistrationMagic allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects RegistrationMagic: from n/a through 5.1.9.2.
CVE-2023-23985 -- Missing Authorization vulnerability in Quiz Maker team Quiz Maker.This issue affects Quiz Maker: from n/a through 6.3.9.4.
CVE-2023-23989 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss RegistrationMagic.This issue affects RegistrationMagic: from n/a through 5.1.9.2.
CVE-2023-25785 -- Missing Authorization vulnerability in Shoaib Saleem WP Post Rating allows Functionality Misuse.This issue affects WP Post Rating: from n/a through 2.5.
CVE-2023-25790 -- Improper Authentication, Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in xtemos WoodMart allows Cross-Site Scripting (XSS).This issue affects WoodMart: from n/a through 7.0.4.
CVE-2023-31090 -- Unrestricted Upload of File with Dangerous Type vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) allows Upload a Web Shell to a Web Server.This issue affects Unlimited Elements For Elementor (Free Widg
CVE-2023-32127 -- Missing Authorization vulnerability in Daniel Powney Multi Rating allows Functionality Misuse.This issue affects Multi Rating: from n/a through 5.0.6.
CVE-2023-47504 -- Improper Authentication vulnerability in Elementor Elementor Website Builder allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Elementor Website Builder: from n/a through 3.16.4.
CVE-2023-47774 -- Improper Restriction of Rendered UI Layers or Frames vulnerability in Automattic Jetpack allows Clickjacking.This issue affects Jetpack: from n/a before 12.7.
CVE-2023-48763 -- Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS vulnerability in Crocoblock JetFormBuilder allows Code Injection.This issue affects JetFormBuilder: from n/a through 3.1.4.
CVE-2023-51405 -- Improper Authentication vulnerability in Repute Infosystems BookingPress allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects BookingPress: from n/a through 1.0.74.
CVE-2023-51425 -- Improper Privilege Management vulnerability in Jacques Malgrange Rencontre – Dating Site allows Privilege Escalation.This issue affects Rencontre – Dating Site: from n/a through 3.10.1.
CVE-2023-51471 -- Improper Authentication vulnerability in Mestres do WP Checkout Mestres WP allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Checkout Mestres WP: from n/a through 7.1.9.7.
CVE-2023-51472 -- Improper Authentication vulnerability in Mestres do WP Checkout Mestres WP allows Privilege Escalation.This issue affects Checkout Mestres WP: from n/a through 7.1.9.7.
CVE-2023-51477 -- Improper Authentication vulnerability in BUDDYBOSS DMCC BuddyBoss Theme allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects BuddyBoss Theme: from n/a through 2.4.60.
CVE-2023-7253 -- The Import WP WordPress plugin before 2.13.1 does not prevent users with the administrator role from pinging conducting SSRF attacks, which may be a problem in multisite configurations.
CVE-2023-7253 -- The Import WP WordPress plugin before 2.13.1 does not prevent users with the administrator role from pinging conducting SSRF attacks, which may be a problem in multisite configurations.
CVE-2024-0151 -- Insufficient argument checking in Secure state Entry functions in software using Cortex-M Security Extensions (CMSE), that has been compiled using toolchains that implement 'Arm v8-M Security Extensions Requirements on Development Tools' prior to version
CVE-2024-1743 -- The WooCommerce Customers Manager WordPress plugin before 29.8 does not sanitise and escape various parameters before outputting them back in pages and attributes, leading to a Reflected Cross-Site Scripting which could be used against high privilege user
CVE-2024-1756 -- The WooCommerce Customers Manager WordPress plugin before 29.8 does not have authorisation and CSRF in an AJAX action, allowing any authenticated users, such as subscriber, to call it and retrieve the list of customer email addresses along with their id,
CVE-2024-20295 -- A vulnerability in the CLI of the Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerabili
CVE-2024-20313 -- A vulnerability in the OSPF version 2 (OSPFv2) feature of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is d
CVE-2024-20353 -- A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, result
CVE-2024-20356 -- A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate
CVE-2024-20358 -- A vulnerability in the Cisco Adaptive Security Appliance (ASA) restore functionality that is available in Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on th
CVE-2024-20359 -- A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticat
CVE-2024-23228 -- This issue was addressed through improved state management. This issue is fixed in iOS 17.3 and iPadOS 17.3. Locked Notes content may have been unexpectedly unlocked.
CVE-2024-23271 -- A logic issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, Safari 17.3, tvOS 17.3, macOS Sonoma 14.3, watchOS 10.3. A malicious website may cause unexpected cross-origin behavior.
CVE-2024-2402 -- The Better Comments WordPress plugin before 1.5.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
CVE-2024-2404 -- The Better Comments WordPress plugin before 1.5.6 does not sanitise and escape some of its settings, which could allow low privilege users such as Subscribers to perform Stored Cross-Site Scripting attacks.
CVE-2024-2404 -- The Better Comments WordPress plugin before 1.5.6 does not sanitise and escape some of its settings, which could allow low privilege users such as Subscribers to perform Stored Cross-Site Scripting attacks.
CVE-2024-27791 -- The issue was addressed with improved checks. This issue is fixed in iOS 17.3 and iPadOS 17.3, tvOS 17.3, macOS Ventura 13.6.4, iOS 16.7.5 and iPadOS 16.7.5, macOS Monterey 12.7.3, macOS Sonoma 14.3. An app may be able to corrupt coprocessor memory.
CVE-2024-28613 -- SQL Injection vulnerability in PHP Task Management System v.1.0 allows a remote attacker to escalate privileges and obtain sensitive information via the task_id parameter of the task-details.php, and edit-task.php component.
CVE-2024-28825 -- Improper restriction of excessive authentication attempts on some authentication methods in Checkmk before 2.3.0b5 (beta), 2.2.0p26, 2.1.0p43, and in Checkmk 2.0.0 (EOL) facilitates password brute-forcing.
CVE-2024-28963 -- Telemetry Dashboard v1.0.0.7 for Dell ThinOS 2402 contains a sensitive information disclosure vulnerability. An unauthenticated user with local access to the device could exploit this vulnerability to read sensitive proxy settings information.
CVE-2024-28976 -- Dell Repository Manager, versions prior to 3.4.5, contains a Path Traversal vulnerability in API module. A local attacker with low privileges could potentially exploit this vulnerability to gain unauthorized write access to the files stored on the server
CVE-2024-28977 -- Dell Repository Manager, versions 3.4.2 through 3.4.4,contains a Path Traversal vulnerability in logger module. A local attacker with low privileges could potentially exploit this vulnerability to gain unauthorized read access to the files stored on the s
CVE-2024-2972 -- The Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button WordPress plugin before 3.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin t
CVE-2024-31406 -- Active debug code vulnerability exists in RoamWiFi R10 prior to 4.8.45. If this vulnerability is exploited, a network-adjacent unauthenticated attacker with access to the device may perform unauthorized operations.
CVE-2024-32051 -- Insertion of sensitive information into log file issue exists in RoamWiFi R10 prior to 4.8.45. If this vulnerability is exploited, a network-adjacent unauthenticated attacker with access to the device may obtain sensitive information.
CVE-2024-32078 -- URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Foliovision FV Flowplayer Video Player.This issue affects FV Flowplayer Video Player: from n/a through 7.5.44.7212.
CVE-2024-32432 -- Missing Authorization vulnerability in Ovic Team Ovic Addon Toolkit.This issue affects Ovic Addon Toolkit: from n/a through 2.6.1.
CVE-2024-3261 -- The Strong Testimonials WordPress plugin before 3.1.12 does not validate and escape some of its Testimonial fields before outputting them back in a page/post, which could allow users with the contributor role and above to perform Stored Cross-Site Scripti
CVE-2024-32675 -- Missing Authorization vulnerability in Xfinity Soft Order Limit for WooCommerce.This issue affects Order Limit for WooCommerce: from n/a through 2.0.0.
CVE-2024-32677 -- Missing Authorization vulnerability in LoginPress LoginPress Pro.This issue affects LoginPress Pro: from n/a through 2.5.3.
CVE-2024-32677 -- Missing Authorization vulnerability in LoginPress LoginPress Pro.This issue affects LoginPress Pro: from n/a before 3.0.0.
CVE-2024-32678 -- Missing Authorization vulnerability in TrackShip TrackShip for WooCommerce.This issue affects TrackShip for WooCommerce: from n/a through 1.7.5.
CVE-2024-32699 -- Cross-Site Request Forgery (CSRF) vulnerability in YITH YITH WooCommerce Compare.This issue affects YITH WooCommerce Compare: from n/a through 2.37.0.
CVE-2024-32702 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Repute info systems ARForms allows Reflected XSS.This issue affects ARForms: from n/a through 6.4.
CVE-2024-32706 -- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Repute info systems ARForms.This issue affects ARForms: from n/a through 6.4.
CVE-2024-32707 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GhozyLab Image Slider Widget allows Stored XSS.This issue affects Image Slider Widget: from n/a through 1.1.125.
CVE-2024-32710 -- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
CVE-2024-32711 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in myCred allows Stored XSS.This issue affects myCred: from n/a through 2.6.3.
CVE-2024-32716 -- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in StreamWeasels StreamWeasels Twitch Integration.This issue affects StreamWeasels Twitch Integration: from n/a through 1.7.8.
CVE-2024-32718 -- Server-Side Request Forgery (SSRF) vulnerability in Webangon The Pack Elementor.This issue affects The Pack Elementor addons: from n/a through 2.0.8.2.
CVE-2024-32721 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jegtheme Jeg Elementor Kit allows Stored XSS.This issue affects Jeg Elementor Kit: from n/a through 2.6.3.
CVE-2024-32722 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Coupon & Discount Code Reveal Button allows Stored XSS.This issue affects Coupon & Discount Code Reveal Button: from n/a through 1.2.5.
CVE-2024-32723 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Code Tides Advanced Floating Content allows Stored XSS.This issue affects Advanced Floating Content: from n/a through 1.2.5.
CVE-2024-32726 -- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in vinoth06. Frontend Dashboard.This issue affects Frontend Dashboard: from n/a through 2.2.2.
CVE-2024-32728 -- Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs Paid Member Subscriptions.This issue affects Paid Member Subscriptions: from n/a through 2.11.0.
CVE-2024-32773 -- Cross-Site Request Forgery (CSRF) vulnerability in WP Royal Royal Elementor Kit.This issue affects Royal Elementor Kit: from n/a through 1.0.116.
CVE-2024-32775 -- Server-Side Request Forgery (SSRF) vulnerability in Pavex Embed Google Photos album.This issue affects Embed Google Photos album: from n/a through 2.1.9.
CVE-2024-32780 -- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in E4J s.R.L. VikRentCar.This issue affects VikRentCar: from n/a through 1.3.2.
CVE-2024-32781 -- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ThemeHigh Email Customizer for WooCommerce.This issue affects Email Customizer for WooCommerce: from n/a through 2.6.0.
CVE-2024-32782 -- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in HasThemes HT Mega.This issue affects HT Mega: from n/a through 2.4.7.
CVE-2024-32785 -- Cross-Site Request Forgery (CSRF) vulnerability in Webangon The Pack Elementor addons allows Cross-Site Scripting (XSS).This issue affects The Pack Elementor addons: from n/a through 2.0.8.3.
CVE-2024-32788 -- Insertion of Sensitive Information into Log File vulnerability in Frédéric GILLES FG Joomla to WordPress.This issue affects FG Joomla to WordPress: from n/a through 4.20.2.
CVE-2024-32789 -- Cross-Site Request Forgery (CSRF) vulnerability in Seers allows Cross-Site Scripting (XSS).This issue affects Seers: from n/a through 8.1.0.
CVE-2024-32791 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Leap13 Premium Addons for Elementor allows Stored XSS.This issue affects Premium Addons for Elementor: from n/a through 4.10.25.
CVE-2024-32794 -- Cross-Site Request Forgery (CSRF) vulnerability in Paid Memberships Pro.This issue affects Paid Memberships Pro: from n/a through 2.12.10.
CVE-2024-32795 -- Cross-Site Request Forgery (CSRF) vulnerability in Revmakx WPCal.Io – Easy Meeting Scheduler.This issue affects WPCal.Io – Easy Meeting Scheduler: from n/a through 0.9.5.8.
CVE-2024-32796 -- Insertion of Sensitive Information into Log File vulnerability in Very Good Plugins WP Fusion Lite.This issue affects WP Fusion Lite: from n/a through 3.42.10.
CVE-2024-32801 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ShapedPlugin Widget Post Slider allows Stored XSS.This issue affects Widget Post Slider: from n/a through 1.3.5.
CVE-2024-32803 -- Server-Side Request Forgery (SSRF) vulnerability in 2day.Sk, Webikon SuperFaktura WooCommerce.This issue affects SuperFaktura WooCommerce: from n/a through 1.40.3.
CVE-2024-32806 -- Cross-Site Request Forgery (CSRF) vulnerability in CoSchedule Headline Analyzer.This issue affects Headline Analyzer: from n/a through 1.3.3.
CVE-2024-32808 -- Authorization Bypass Through User-Controlled Key vulnerability in Metagauss ProfileGrid.This issue affects ProfileGrid : from n/a through 5.7.9.
CVE-2024-32812 -- Server-Side Request Forgery (SSRF) vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.0.11.
CVE-2024-32815 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jeroen Peters All-in-one Like Widget allows Stored XSS.This issue affects All-in-one Like Widget: from n/a through 2.2.7.
CVE-2024-32816 -- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PickPlugins Post Grid.This issue affects Post Grid: from n/a through 2.2.78.
CVE-2024-32817 -- Deserialization of Untrusted Data vulnerability in Import and export users and customers.This issue affects Import and export users and customers: from n/a through 1.26.2.
CVE-2024-32819 -- Server-Side Request Forgery (SSRF) vulnerability in Culqi.This issue affects Culqi: from n/a through 3.0.14.
CVE-2024-32823 -- Authorization Bypass Through User-Controlled Key vulnerability in FeedbackWP Rate my Post – WP Rating System.This issue affects Rate my Post – WP Rating System: from n/a through 3.4.4.
CVE-2024-32825 -- Insertion of Sensitive Information into Log File vulnerability in Patrick Posner Simply Static.This issue affects Simply Static: from n/a through 3.1.3.
CVE-2024-32833 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nick Halsey List Custom Taxonomy Widget allows Stored XSS.This issue affects List Custom Taxonomy Widget: from n/a through 4.1.
CVE-2024-32834 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebToffee WooCommerce Shipping Label allows Stored XSS.This issue affects WooCommerce Shipping Label: from n/a through 2.3.8.
CVE-2024-32835 -- Deserialization of Untrusted Data vulnerability in WebToffee Import Export WordPress Users.This issue affects Import Export WordPress Users: from n/a through 2.5.3.
CVE-2024-32836 -- Unrestricted Upload of File with Dangerous Type vulnerability in WP Lab WP-Lister Lite for eBay.This issue affects WP-Lister Lite for eBay: from n/a through 3.5.11.
CVE-2024-32872 -- Umbraco workflow provides workflows for the Umbraco content management system. Prior to versions 10.3.9, 12.2.6, and 13.0.6, an Umbraco Backoffice user can modify requests to a particular API endpoint to include SQL, which will be executed by the server.
CVE-2024-32876 -- NewPipe is an Android app for video streaming written in Java. It supports exporting and importing backups, as a way to let users move their data to a new device effortlessly. However, in versions 0.13.4 through 0.26.1, importing a backup file from an unt
CVE-2024-32879 -- Python Social Auth is a social authentication/registration mechanism. Prior to version 5.4.1, due to default case-insensitive collation in MySQL or MariaDB databases, third-party authentication user IDs are not case-sensitive and could cause different IDs
CVE-2024-32947 -- Cross-Site Request Forgery (CSRF) vulnerability in AlumniOnline Web Services LLC WP ADA Compliance Check Basic.This issue affects WP ADA Compliance Check Basic: from n/a through 3.1.3.
CVE-2024-32948 -- Missing Authorization vulnerability in Repute Infosystems ARMember.This issue affects ARMember: from n/a through 4.0.28.
CVE-2024-32950 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DeBAAT WP Media Category Management allows Reflected XSS.This issue affects WP Media Category Management: from n/a through 2.2.
CVE-2024-32951 -- Missing Authorization vulnerability in BloomPixel Max Addons Pro for Bricks.This issue affects Max Addons Pro for Bricks: from n/a through 1.6.1.
CVE-2024-32952 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BloomPixel Max Addons Pro for Bricks allows Reflected XSS.This issue affects Max Addons Pro for Bricks: from n/a through 1.6.1.
CVE-2024-32953 -- Insertion of Sensitive Information into Log File vulnerability in Newsletters.This issue affects Newsletters: from n/a through 4.9.5.
CVE-2024-32954 -- Unrestricted Upload of File with Dangerous Type vulnerability in Tribulant Newsletters.This issue affects Newsletters: from n/a through 4.9.5.
CVE-2024-32955 -- Server-Side Request Forgery (SSRF) vulnerability in Foliovision FV Flowplayer Video Player.This issue affects FV Flowplayer Video Player: from n/a through 7.5.43.7212.
CVE-2024-32956 -- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rometheme RomethemeKit For Elementor allows Stored XSS.This issue affects RomethemeKit For Elementor: from n/a through 1.4.1.
CVE-2024-32958 -- Cross-Site Request Forgery (CSRF) vulnerability in Giorgos Sarigiannidis Slash Admin allows Cross-Site Scripting (XSS).This issue affects Slash Admin: from n/a through 3.8.1.
CVE-2024-33531 -- cdbattags lua-resty-jwt 0.2.3 allows attackers to bypass all JWT-parsing signature checks by crafting a JWT with an enc header with the value A256GCM.
CVE-2024-3371 -- MongoDB Compass may accept and use insufficiently validated input from an untrusted external source. This may cause unintended application behavior, including data disclosure and enabling attackers to impersonate users. This issue affects MongoDB Compass
CVE-2024-4093 -- A vulnerability, which was classified as critical, was found in SourceCodester Simple Subscription Website 1.0. Affected is an unknown function of the file view_application.php. The manipulation of the argument id leads to sql injection. It is possible to
CVE-2024-4111 -- A vulnerability was found in Tenda TX9 22.03.02.10. It has been rated as critical. Affected by this issue is the function sub_42BD7C of the file /goform/SetLEDCfg. The manipulation of the argument time leads to stack-based buffer overflow. The attack may
CVE-2024-4112 -- A vulnerability classified as critical has been found in Tenda TX9 22.03.02.10. This affects the function sub_42CB94 of the file /goform/SetVirtualServerCfg. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to ini
CVE-2024-4113 -- A vulnerability classified as critical was found in Tenda TX9 22.03.02.10. This vulnerability affects the function sub_42D4DC of the file /goform/SetSysTimeCfg. The manipulation of the argument time leads to stack-based buffer overflow. The attack can be
CVE-2024-4114 -- A vulnerability, which was classified as critical, has been found in Tenda TX9 22.03.02.10. This issue affects the function sub_42C014 of the file /goform/PowerSaveSet. The manipulation of the argument time leads to stack-based buffer overflow. The attack
CVE-2024-4115 -- A vulnerability, which was classified as critical, was found in Tenda W15E 15.11.0.14. Affected is the function formAddDnsForward of the file /goform/AddDnsForward. The manipulation of the argument DnsForwardRule leads to stack-based buffer overflow. It i
CVE-2024-4116 -- A vulnerability has been found in Tenda W15E 15.11.0.14 and classified as critical. Affected by this vulnerability is the function formDelDhcpRule of the file /goform/DelDhcpRule. The manipulation of the argument delDhcpIndex leads to stack-based buffer o
CVE-2024-4117 -- A vulnerability was found in Tenda W15E 15.11.0.14 and classified as critical. Affected by this issue is the function formDelPortMapping of the file /goform/DelPortMapping. The manipulation of the argument portMappingIndex leads to stack-based buffer over
CVE-2024-4118 -- A vulnerability was found in Tenda W15E 15.11.0.14. It has been classified as critical. This affects the function formIPMacBindAdd of the file /goform/addIpMacBind. The manipulation of the argument IPMacBindRule leads to stack-based buffer overflow. It is
CVE-2024-4119 -- A vulnerability was found in Tenda W15E 15.11.0.14. It has been declared as critical. This vulnerability affects the function formIPMacBindDel of the file /goform/delIpMacBind. The manipulation of the argument IPMacBindIndex leads to stack-based buffer ov
CVE-2024-4120 -- A vulnerability was found in Tenda W15E 15.11.0.14. It has been rated as critical. This issue affects the function formIPMacBindModify of the file /goform/modifyIpMacBind. The manipulation of the argument IPMacBindRuleId/IPMacBindRuleIp/IPMacBindRuleMac/I
CVE-2024-4121 -- A vulnerability classified as critical has been found in Tenda W15E 15.11.0.14. Affected is the function formQOSRuleDel. The manipulation of the argument qosIndex leads to stack-based buffer overflow. It is possible to launch the attack remotely. The iden
CVE-2024-4122 -- A vulnerability classified as critical was found in Tenda W15E 15.11.0.14. Affected by this vulnerability is the function formSetDebugCfg of the file /goform/setDebugCfg. The manipulation of the argument enable/level/module leads to stack-based buffer ove
CVE-2024-4123 -- A vulnerability, which was classified as critical, has been found in Tenda W15E 15.11.0.14. Affected by this issue is the function formSetPortMapping of the file /goform/SetPortMapping. The manipulation of the argument portMappingServer/portMappingProtoco
CVE-2024-4124 -- A vulnerability, which was classified as critical, was found in Tenda W15E 15.11.0.14. This affects the function formSetRemoteWebManage of the file /goform/SetRemoteWebManage. The manipulation of the argument remoteIP leads to stack-based buffer overflow.
CVE-2024-4125 -- A vulnerability has been found in Tenda W15E 15.11.0.14 and classified as critical. This vulnerability affects the function formSetStaticRoute of the file /goform/setStaticRoute. The manipulation of the argument staticRouteIndex leads to stack-based buffe
CVE-2024-4126 -- A vulnerability was found in Tenda W15E 15.11.0.14 and classified as critical. This issue affects the function formSetSysTime of the file /goform/SetSysTimeCfg. The manipulation of the argument manualTime leads to stack-based buffer overflow. The attack m
CVE-2024-4127 -- A vulnerability was found in Tenda W15E 15.11.0.14. It has been classified as critical. Affected is the function guestWifiRuleRefresh. The manipulation of the argument qosGuestDownstream leads to stack-based buffer overflow. It is possible to launch the a
CVE-2024-4141 -- Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by an invalid character code in a Type 1 font. The root problem was a bounds check that was being optimized away by modern compilers.
Hunters is name dropping SpaceX hereTweet edits are disabled once you comment on your own tweet. Can this be fixed @elonmusk -- alvieriD
Allegedly a third party breach and not directly -- alvieriD
GoPro development environment also posted as part of a third party breach and not that of SpaceX or GoPro directly. -- alvieriD
SpaceX samples have just been posted by Hunters International.149.9 GB in 100 files threatened @elonmusk @SpaceX -- alvieriD
Unlike #botnets that launch #DDoS attacks, #Socks5Systemz specializes in traffic forwarding 🤖With thousands of devices currently infected, it's important to know how it operates.Learn more and collect its latest #IOCs and samples ⬇️any.run/malware-trends/ -- anyrun_app
Introducing #ANYRUN's YARA Search! Discover malware, hashes, and processes with YARA across a vast database. Scan 24TB of threat data, write and debug YARA rules online, get initial matches in under 5 secs, and download identified #malware. Learn more 👇an -- anyrun_app
A Glance into the Spyware Industrygithub.com/blackorbird/APT_R… -- blackorbird
Check out the reports on the ArcaneDoor campaign & the implants found in Cisco ASA devicesThis is definitely the biggest story of the month for me!Talosblog.talosintelligence.com/a…NCSCncsc.gov.uk/static-assets/do…ncsc.gov.uk/static-assets/do…Canadian Cen -- cyb3rops
Come join the hunt! Looking for a Senior threat Hunter in the UKcareers.dragos.com/jobs/2059… -- DrunkBinary
MS-DOS v4.0 source code released by @Microsoft github.com/microsoft/MS-DOS -- hackerfantastic
Excelling at Excel, Part 4hexacorn.com/blog/2024/04/25… -- Hexacorn
#redditdown -- james_inthe_box
"data.tmp": f7559f6d4346f412c2c4ea18363efba3075345b7533af9964298803ffe75f919🤔honehsn[.]com - @Namecheap registered...136.0.9[.]101@ShadowChasing1 @h2jazi -- malwrhunterteam
"loopy.apk": d439c06fff2289fe13d56f50f4e09df8182433e284eaa866a4a61713cd2c04fcFrom: https://buredcofe[.]com/loopy.apk -- malwrhunterteam
"wxwork": d9020d5f7b6fba1efc1161fdf74111de5023d9cc18472f39415c9aafb444ff02117.72.64[.]94 - related: nitter.no-logs.com/drb_ra/status/17…🤔 -- malwrhunterteam
-- malwrhunterteam
🤡🤝🤡 -- malwrhunterteam
Only can imagine what kind of IT policies are in place in a (not a random small) hospital where the password used in relation to the backup solution they are using can be simply a city's name...🤷‍♂️ -- malwrhunterteam
Drumroll, please. 🥁Nemesis 1.0.0 has dropped! From host modeling to dashboard changes, read @harmj0y's new blog post detailing the updated features in this release. ghst.ly/44irzdx -- specterops
Happening today! Hear from @StephenHinck on the changes & enhancements made to BloodHound thus far in 2024.There's still time to lock in your spot ➡️ ghst.ly/4aC37pK -- specterops
BEC was far and away the attack that adversaries carried out most often last quarter, according to Talos Incident Response. But #ransomware still remained a threat, including several new #malware families we had never seen in the wild before cs.co/6012bsF -- talossecurity
Why the private sector (probably) isn't coming to save the #NVD. More in this week's Threat Source newsletter: cs.co/6011bQImP -- talossecurity
Business email compromise was the most popular threat Talos IR saw in engagements last quarter. Learn more in our new Quarterly Trends report, out now: cs.co/6012bsF88 -- talossecurity
"Multiple wmic enumeration commands were executed from the Cobalt Strike beacon, with the aim of enumerating information related to the physical disk, memory, network adapters, bios and domain of a compromised server." -- TheDFIRReport
Breaking Secure Onboard Communication (SecOC) on 2021 RAV4 Prime by attacking the power steering ECUCredits Willem Melching (@PD0WM)icanhack.nl/blog/secoc-key-e…#automotive #infosec -- 0xor0ne
Course on Linux debugging, profiling and tracing training by @bootlincom Slides: bootlin.com/doc/training/deb…Lab exercises: bootlin.com/doc/training/deb…Lab material (.tar.xz): bootlin.com/doc/training/deb…#Linux #linuxkernel -- 0xor0ne
Exploitation of vulnerabilities affecting Cisco Firewall Platforms | ncsc.gov.uk/news/exploitatio… @NCSC -- 780thC
Cyber Activity Impacting CISCO ASA VPNs (Canadian Centre for Cyber Security): cyber.gc.ca/en/news-events/c… -- 780thC
These cyber-spy campaigns, dubbed “ArcaneDoor” by Cisco, were first spotted in early January and revealed on Wednesday. And they targeted VPN services used by governments and critical infrastructure networks around the globe, according to a joint advisory -- 780thC
ArcaneDoor is a campaign that is the latest example of state-sponsored actors targeting perimeter network devices from multiple vendors. Tracked as UAT4356 by Talos and STORM-1849 by @MsftSecIntel | blog.talosintelligence.com/a… @TalosSecurity -- 780thC
You wouldn’t last an hour in the asylum where they raised me -- bushidotoken
🔥 Big hit to the Darknet and Cybercrime Underground cryptocurrency mixing industrySamourai Wallet has been seized by the US Justice Department 🇺🇸🦅 justice.gov/usao-sdny/pr/fou… -- bushidotoken
Samples 👇bazaar.abuse.ch/sample/156c0…bazaar.abuse.ch/sample/8041a…bazaar.abuse.ch/sample/1625a… -- Cryptolaemus1
distrohttps://bissecci.]org/wp-content/plugins/user-private-files/shared/https://nlqbgkl5.]org/security_check/http://45.95.11.217/ad.msic2'shttps://jarinamaers.]shop/live/https://wrankaget.]site/live/https://pewwhranet.]com/livehttps://grizmotras.]com/liv -- Cryptolaemus1
#Latrodectus - .pdf > url > .js > .msi > .dllwscript Document.jsmsiexec /Vrundll32.exe C:\Users\Admin\AppData\Local\sharepoint\360total.dll, homqrundll32.exe C:\Users\Admin\AppData\Roaming\Custom_update\Update_e3f60166.dll, homq(1/3)👇 IOC'sgithub.com/pr0x -- Cryptolaemus1
Unlock the secrets of the skies with SkyTrack!From detailed aircraft information to past flight records, discover everything you want to know about aviation with ease.github.com/ANG13T/skytrack@AngelinaTsuboi#OSINT #passivescan #reconnaissance #infosec #c -- DailyOsint
📊 This week's #OSINT #poll #question.🥷 What do you think is the main difference between Tor, I2P and Freenet?#reconnaissance #investigation #intelligence #tool #cybersecurity #infosec -- DailyOsint
A threat actor claims to be selling Admin access to an Iranian Power Plant on a hackers' forum.#Iran#darkweb #cyberattack #databreach #cti -- FalconFeedsio
RansomHouse #ransomware group has added 2 new victims to their #darkweb portal.- STERCH-INTERNATIONAL 🇨🇿- Army Welfare Trust 🇵🇰#CzechRepublic#Pakistan#ransomhouse #databreach #cyberattack #cti -- FalconFeedsio
Everest #ransomware group has added Les Miroirs St-Antoine Inc (miroirstantoine.com ) to their victim list.#Canada#Everest #cti #cyberattack #darkweb #databreach -- FalconFeedsio
RansomHub #ransomware group has added Design Intoto (designintoto.com.au) to their victim list.#Australia#RansomHub #cti #cyberattack #darkweb #databreach -- FalconFeedsio
A threat actor claims to be selling the database of Pondicherry University (pondiuni.edu.in) on a hackers' forum.#India#darkweb #cyberattack #databreach #cti -- FalconFeedsio
DARKVAULT #ransomware group has added Barazal Rastreador (bzrastreador.com.br) to their victim list.#Brazil#darkvault #darkweb #databreach #cyberattack #cti -- FalconFeedsio
NoName claims to have targeted multiple websites.- Elefun 🇳🇴- AkuAkcesoria 🇵🇱- Svetelná Pošta 🇸🇰- OneDrone 🇸🇮#Norway #Poland#Slovakia #Slovenia#ddos #cyberattack #cti #threatintel -- FalconFeedsio
Qilin #ransomware group has added Beloin Law (beloinlaw.com) to their victim list.#USA#qilin #cyberattack #darkweb #databreach -- FalconFeedsio
Mydata/Alphalocker #ransomware group has added First Texas Alliance Corp (firsttx.com ,goftac.com) to their victim list.#USA#mydata #darkweb #cyberattack #databreach #cti -- FalconFeedsio
HUNTERS INTERNATIONAL #ransomware group has added Central Power Systems and Services (cpower.com) to their victim list.#USA#huntersinternational #cti #cyberattack #darkweb #databreach -- FalconFeedsio
BLACK SUIT #ransomware group has added Peter Condakes Co (petercondakes.com) to their victim list.#USA#blacksuit #cti #cyberattack #darkweb #databreach -- FalconFeedsio
Qiulong #ransomware group has added Hominem Clinic (hominemclinic.com.br) to their victim list.#Brazil#Qiulong #cti #cyberattack #darkweb #databreach -- FalconFeedsio
NoName claims to have targeted multiple websites in Moldova.- Republic of Moldova- The Government of the Republic of Moldova- Information Technology and Cyber ​​ Security Service- Presidency of the Republic of Moldova- Public Services Portal-Main -- FalconFeedsio
RansomHub #ransomware group has added 2 new victims to their #darkweb portal. - RH Bluestein 🇺🇸- Europeanprof 🇪🇸#USA#Spain#ransomhub #databreach #cti #cyberattack -- FalconFeedsio
BlackBasta #ransomware group has added TRUE Solicitors LLP (true.co.uk) to their victim list.#UK#blackbasta #cyberattack #darkweb #databreach -- FalconFeedsio
lsassyPython tool to remotely extract credentials on a set of hosts.github.com/login-securite/ls…#infosec #pentesting #redteam -- hack_git
Ominis OSINTPython script. It performs online information gathering by querying Google for search results related to a user-inputted query. The tool extracts relevant information such as titles, URLs...github.com/AnonCatalyst/Omin…#OSINT #cybersecurity #i -- hack_git
Microsoft customers can use threat intelligence reports in the Microsoft Defender portal to get the most up-to-date intelligence and protection information on the ArcaneDoor (msft.it/6016YJdz0) and Storm-1849 (msft.it/6017YJdzF). -- MsftSecIntel
Our relationships with fellow intelligence analysts, detection engineers, & security experts are key to our success. We know security is a team sport. We send our thanks for the collaboration and congratulations on the great intelligence work to our frien -- MsftSecIntel
This collaboration enabled Microsoft and Cisco Talos to protect our mutual customers from ArcaneDoor and Storm-1849. Working with threat intelligence analysts around the globe is an important part of Microsoft’s focus on protecting users and organizations -- MsftSecIntel
Yesterday @TalosSecurity released a threat intelligence blog detailing the ArcaneDoor espionage-focused campaign. Microsoft Threat Intelligence collaborated with Cisco Talos to provide data and analysis on the threat actor Storm-1849 (UAT4356). msft.it/60 -- MsftSecIntel
Microsoft researchers built ICSpector based on the intelligence gathered from research on the Codesys V3 SDK. Details of the analysis will be presented at RSA on May 6: msft.it/6016YJ3Kj -- MsftSecIntel
Microsoft shares more details on ICSpector, an open-source framework that enables investigators to scan their network for PLCs, extract project configuration and code from controllers, and detect any anomalous components within ICS environments: msft.it/6 -- MsftSecIntel
La pobreza es la Gran Política Pública del Obradorato.Es el mayor ejemplo de una Ingeniería Social (en el sentido de Popper) exitosa."No importa que sea una dictadura, lo que importa es que nos den apoyitos sociales pinches". -- n4hualH
Visualizing OSINT data to support due diligence investigations dlvr.it/T60DVK #OSINT #Medium -- osintbear
crypto OSINT Tools dlvr.it/T602Vm #OSINT #Medium -- osintbear
OSHIT: Seven Deadly Sins of Bad Open Source Research dlvr.it/T61N2z #bellingcat -- osintbear
My data got leaked dlvr.it/T61GZk #OSINT #Medium -- osintbear
Discovery of information about a phisher through OSINT. dlvr.it/T60pQD #OSINT #Medium -- osintbear
Découverte d’informations relatives à un phisheur grâce à l’OSINT. dlvr.it/T60pP5 #OSINT #Medium -- osintbear
The XQL queries for hunting for known IoCs have been updated in our threat brief on #CVE20243400: bit.ly/43YOECb -- unit42_intel
Today Microsoft open-sourced MS-DOS 4.0.You can check it out here: github.com/microsoft/MS-DOS -- vxunderground
Hello,We have a lot of super cool stuff happening behind the scenes. We think all of you will enjoy it.In the meantime, please look at this random proof-of-concept images which totally aren't related to the vx-underground 5 year anniversary -- vxunderground
Hello,We have 3 harddrives left in stock. Once the last 3 are purchased the cloning stage will begin.- Each buyer gets a free duck (not a joke)- My home is full of packing material (also not a joke)- Buy them!!!!!11vx-underwear.org/collections… -- vxunderground
In Japan – the Fukui Prefectural Police Echizen Police Station have created the "Virus/Trojan horse removal fee payment card" and the "Unpaid charges/delinquent charges payment card".The fake cards, designed to combat telephone scammers, are positioned in -- vxunderground
"in the ever* expanding threat landscape."This had a typo for like 6 hours before we noticed. FeelsBadMan.jpeg -- vxunderground
-- vxunderground
It appears we have deeply angered nerds who like unique usernames. We apologize for not being privy to username buying and selling. We will repent for our mistake by offering one (1) cat picture. -- vxunderground
資料の最終確認で久しぶりに特定アクタについてリサーチすると、新たな鉱脈を掘り当ててしまい悩むことになったなぜ、そんな未発表のデータがそこにある。。。 -- 58_158_177_102
-- 58_158_177_102
#botconf2024 -- 58_158_177_102
New Hunters International leak site./huntersinternational[.]net -- alvieriD
-- alvieriD
Sprint Host ip 45.91.8[.]229NiceNicNET“Mihail Kolesnikov” -- alvieriD
The pew-pew cybers newsletter is out! This is way to long to summarize here. Summary on Masto:mastodon.social/@campuscodi/… -- campuscodi
Learn more about how we're revolutionizing incident triage processes (for endpoint, reported phishing, and now SIEM alerts) and empowering security teams to use AI for better SOC automation 💪 Link here: prnewswire.com/news-releases…#CyberSecurity #AI #Au -- IntezerLabs
Designed to automatically triage alerts, deeply investigate incidents, and escalate findings about serious threats, our innovative technology eliminates alert fatigue so you can stay focused on the real threats. -- IntezerLabs
We're thrilled to officially announce our new AI-driven solution for SIEM alert triage in the Autonomous SOC platform! 🚀 -- IntezerLabs
A user has appeared on Twitter with the profile creation date of the Unix Epoch 😭 -- vxunderground
How to burn sources 101. Tbf good journalism and parallel reconstruction is not an easy endeavor if you need to reconstruct your story from sensitive sources info, but it can be done, @hatr, @Bing_Chris, @lorenzofb, and @snlyngaas are great examples of su -- DrunkBinary
"This adversary is heavily scanning your network infrastructure and poking at your VPNs.""It's just reconnaissance, that happens all the time, why should we be worried?" -- DrunkBinary
The founders of the popular @SamouraiWallet for @bitcoin have been arrested and the website seized as part of an action by FBI, Europol, IRS, New York DA, Portugese and Icelandic Police. samouraiwallet.com/ -- hackerfantastic
The @openssf warns that liblzma / xz-utils backdoor is not an isolated incident and urges FOSS teams to be particularly vigilant to social engineering attacks seeking to position new FOSS maintainers on code repositories. openssf.org/blog/2024/04/15/… -- hackerfantastic
#0day #ApacheSolr Backup/Restore API Remote #CodeExecution #Exploit #Apache #RCE 0day.today/exploit/descripti… -- inj3ct0r
#0day #Nginx 1.25.5 Host Header Validation #Vulnerability 0day.today/exploit/descripti… -- inj3ct0r
#0day Relate Learning And Teaching System #SSTI / Remote #CodeExecution #Vulnerability #RCE 0day.today/exploit/descripti… -- inj3ct0r
Fuck @elonmusk.🤷‍♂️ -- malwrhunterteam
Hackerman.😂 -- malwrhunterteam
Anything it is, now more vendors are detecting it...😂🤷‍♂️ -- malwrhunterteam
"Indus.apk": e024a152f7f49aa9613ea4f89f5c0dabcd5b908b46d4f92019bae0ab6013d296 -- malwrhunterteam
"accidentally"🤷‍♂️ -- malwrhunterteam
"bore-shim-cage-1.exe": 6c9e73950e2ae91674426e9244d6b2427be8d4d4ad44cc68f1185bcfc9e67752"US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp."Uploaded to VT from US with API...🤷‍♂️ -- malwrhunterteam
"windows_x64_agent.exe": e4912f846570cd39174360cb14274237f9ac4caa7b2b6c82a631d6ce077c8fe1No idea what this sample is, but a Mac sample that is packed/obfuscated and says "Windows" & "agent" in the name is suspicious...🤔 -- malwrhunterteam
"FELLOW_COMBINATION": 4e1b76c6284a0adb7ef2944531c9d82777a3de0a8e9f35fe8cccfb0bf375b103148.113.182[.]51 -- malwrhunterteam
Lots of activity, including some interesting... -- malwrhunterteam
The bash script still FUD for vendors on VT, but at least 2 of the sandboxes flags it now...The "systemNo1" still had 2 AV detections and 0 sandbox flags at last scan time. -- malwrhunterteam
"certified professional American hacker"😂🤷‍♂️ -- malwrhunterteam
I had so much fun talking crimeware, threat intel, and old-school hacking scene days with @sherrod_im on the @MsftSecIntel podcast! -- pmelson
Nice #MooBot botnet caught by @banthisguy9349 😂Botnet C2 domain:🔥 putin.zelenskyj .ruPointing to:45.88.90.30:43957 (AS203168 Constant MOULIN 🇧🇪)DNS resolution provided by Cloudflare 🔎Payload URLs:🌐 urlhaus.abuse.ch/host/45.88.…Payload:📄 bazaar.abuse.ch/sa -- abuse_ch
Meme time! Can you relate? 😂 -- anyrun_app
🚨 Dive into the dark world of Mirai malware! Since 2016, this notorious #botnet has been targeting IoT devices, exploiting weak passwords to launch massive cyber attacks. Learn how #Mirai became one of the largest botnets in cyber history.Learn more👇any.r -- anyrun_app
When I look at this table, the first thing I see is that size matters more I reckon users prefer being told: „use a password with at least 10 letters“ instead of „use at least 8 characters, lower and upper case letters, numbers and symbols“hivesystems.com -- cyb3rops
Still the best IT security conference in Germany. There was FIRSTCTI in April and OffensiveCon is in May, but both are in Berlin and I avoid Berlin like the plague. TROOPERS takes place in the beautiful Heidelberg. -- cyb3rops
Group: ransomhouseApprox. Time: 15:01 24/04/24Title: Army Welfare Trust -- RansomwareNews
Group: huntersApprox. Time: 20:52 24/04/24Title: Central Power Systems and Services -- RansomwareNews
Group: blacksuitApprox. Time: 20:52 24/04/24Title: petercondakes.com -- RansomwareNews
Group: darkvaultApprox. Time: 01:04 25/04/24Title: bzrastreador.com.br -- RansomwareNews
Group: ragroupApprox. Time: 18:53 24/04/24Title: Mainwein -- RansomwareNews
Group: ransomhubApprox. Time: 17:01 24/04/24Title: CORIENT <rhbco.com> -- RansomwareNews
Group: ransomhubApprox. Time: 17:01 24/04/24Title: EUROPEANPROF - Expertos en Seguridad y Altura - <europeanprof.es> -- RansomwareNews
Group: ransomhubApprox. Time: 17:01 24/04/24Title: [Published]Constelacion Savings and Credit Society<constelacion.com.sv> -- RansomwareNews
Group: ransomhouseApprox. Time: 17:01 24/04/24Title: STERCH - INTERNATIONAL s.r.o. -- RansomwareNews
Group: alphalockerApprox. Time: 15:01 24/04/24Title: goftac.com/ firsttx.com First Texas Alliance Corp (FTAC) -- RansomwareNews
This week, we're a bit further afield than usual. ATT&CK's @supremrobertson is in Singapore to talk about what's coming from ATT&CK in 2024 at the Asia-Pacific ATT&CK Community Workshop! In-person is full, but you can still join virtually (UTC+8) at na.ev -- MITREattack
Today's the day! Want to learn a bit more about recent malicious installer packages and what you might do to detect them? Join our Mac/Linux lead @coolestcatiknow today (4/24) at 2pm ET as she joins defenders from @redcanary to talk about this threat.redc -- MITREattack
Interested in becoming a Specter? 👻Our Consulting Services and Product teams are growing! Check out our latest job openings and see if you could be a fit. 👉 specterops.io/careers -- specterops
Attack Path Management requires a fundamentally different, unique methodology designed to help orgs understand, empirically quantify impact, & eliminate identity-based Attack Path risks. Meet our experts at #RSAC to learn how.Schedule your demo at ghst.ly -- specterops
"The awscollector.ps1 script contains roughly 14k lines of PowerShell, which appears to handle all manners of tasks such as running Sharphound, clearing Windows event logs, disabling known AV/EDR, sending telegram updates, exfiltrating data to S3 bucket.. -- TheDFIRReport
🌟New report out Monday 4/29 by @r3nzsec, @angelo_violetti & UC1!📷 This intrusion began with an IcedID phishing campaign and ends with domain wide ransomware.Want to receive an email when a new report comes out? Subscribe ⬇️thedfirreport.com/subscribe/ -- TheDFIRReport
We are pleased to announce and welcome onboard the first five partners of #VB2024: @malwation, @TalosSecurity, @Fortinet, @CyberAlliance & @QI_ANXIN. Find out how to join them and make your company visible among security peers: virusbulletin.com/conferenc -- virusbtn
Avast discovered and analyzed a malware campaign hijacking an eScan antivirus update mechanism to distribute backdoors and coinminers | The campaign was orchestrated by a threat actor with possible ties to Kimsuky decoded.avast.io/janrubin/gu… @AvastThrea -- 780thC
LABScon23 Replay | Meet the Iranian Company Powering Russia’s Drone War on Ukraine | sentinelone.com/labs/labscon… @LabsSentinel -- 780thC
Chinese and Russian hackers have turned their focus to edge devices — like VPN appliances, firewalls, routers and Internet of Things (IoT) tools — amid a startling increase in espionage attacks, according to Google security firm Mandiant. therecord.media/ -- 780thC
Qiulong Ransomware has some kind of fetish with plastic surgery and sex posting the first male erectile disfunction clinic I can remember. -- alvieriD
APT73, this domain is now closed. I would like to thank a researcher for reminding me to give proper credit.h/t ~ thank you @Namecheap APT73 no soup for you. NEXT! -- alvieriD
RansomHub posts financial advisor RH Bluestein of US capital management firm Corient Capital. -- alvieriD
Vice Society specialized in breaching schools.Qiulong Ransomware is specializing in breaching plastic surgeons posting their 3rd again exposing nude breast, butt and penile enlargement patient photos. -- alvieriD
h/t and special thank you to @3xp0rtblog thank you for all you do -- alvieriD
Thank you sir may I have another…/wb5vq7qtzubzm6ejmtlgmva5kcprfwc75ynib4qx2v2vzeqhptsrnhad[.]/shed……but wait there’s more. If you like this tweet now vx I will add a special bonus post at no additional cost! @vxunderground -- alvieriD
Thank you sir may I have another(linked archive) /mjmru3yz65o5szsp4rmkmh4adlezcpy5tqjjc4y5z6lozk3nnz2da2ad[.]onion -- alvieriD
Thank you sir may I have another…/ransomgxjnwmu5ceqwo2jrjssxpoicolmgismfpnslaicg3pgpe5qcad[.]onion -- alvieriD
In reality, what they’re worried about is breached data (leaked credentials), infostealer logs, access sales/auctions, ransomware leak site exposure (brand or supply chain), and any other mentions of their brands (and possibly tech stack) on the cybercrim -- bushidotoken
As the co-author of SANS FOR589 Cybercrime Intelligence (sometimes known as “the dark web course”) this is an interesting topic. Stakeholders often are very unfamiliar of what “the dark web” entails and how threats from it impact their business. 1/2 -- bushidotoken
🇷🇺 A Moscow resident was arrested for developing and selling malware via Telegram. The FSB reportedly tracked down the suspect through a website they used to advertise the malware.web.archive.org/web/20240419…h/t @campuscodi & Risky Biz News -- bushidotoken
More info from Recorded Future and additional APT aliases linked to Mahak Rayan Afraz (MRA):— TA456— Yellow Liderc— Crimson Sandstormgo.recordedfuture.com/hubfs/… -- bushidotoken
Quick OSINT search found that this front company is linked to the 🇮🇷 Iranian APT group known as Tortoiseshell (aka Imperial Kitten) by Facebook/Meta’s Cyber Espionage Investigations Team:about.fb.com/news/2021/07/ta… -- bushidotoken
DOJ charges 🇮🇷 Iranians linked to Mahak Rayan Afraz, “an Iran-based company that purported to provide cybersecurity services, but which was, in fact, a front for the conspirators’ operations.”justice.gov/opa/pr/justice-d… -- bushidotoken
A Singaporean guy, an Indian guy, and a German guy walk into a bar…Assessing the Y, and How, of the XZ Utils incident 👉 kas.pr/yzo2 -- e_kaspersky
RansomHouse #ransomware group has added Hirsh Industries (hirshindustries.com) to their victim list.#USA#RansomHouse #cti #cyberattack #darkweb #databreach -- FalconFeedsio
MEDUSA #ransomware group has added 3 new victims to their #darkweb portal. - Comité jeunesse de l'ORIIM/L 🇨🇦- Council of Fashion Designers of America 🇺🇸- Principle Cleaning Services 🇬🇧#Canada#USA#UK#medusa #cyberattack #cti #databreach #darkweb -- FalconFeedsio
Qiulong #ransomware group has added Dr Willian Segalin (drwilliansegalin.com.br) to their victim list.#Brazil#Qiulong #cti #cyberattack #darkweb #databreach -- FalconFeedsio
NoName claims to have targeted multiple websites in Moldova.- Multimedia portal of Parliament of the Republic of Moldova- Government portal of Republic of Moldova- Information Technology and Cyber ​​Security Service- Presidency of the Republic of Moldo -- FalconFeedsio
BLACK SUIT #ransomware group has added Octapharma Plasma (octapharmaplasma.com) to their victim list.#USA#BLACKSUIT #cti #cyberattack #darkweb #databreach -- FalconFeedsio
Rhysida #ransomware group has added Ministerio de Desarrollo Local (mindel.gob.sv) to their victim list.#ElSalvador#rhysida #cti #cyberattack #darkweb #databreach -- FalconFeedsio
NoName claims to have targeted multiple websites.- Engel Modellbau & Technik 🇩🇪- MHM-Modellbau 🇩🇪- N-FACTORY-DE 🇩🇪- CostruzioneDroni 🇮🇹- NKON 🇳🇱#Germany #Italy#Netherlands#ddos #cyberattack #cti #threatintel -- FalconFeedsio
A threat actor claims to be selling the data of the Nigeria Customs Service (customs.gov.ng) on a hackers' forum.#Nigeria#darkweb #cyberattack #databreach #cti -- FalconFeedsio
A threat actor claims to be selling the data of the Ministry of Law and Human Rights of the Republic of Indonesia (kemenkumham.go.id) on a hackers' forum.#Indonesia#darkweb #cyberattack #databreach #cti -- FalconFeedsio
BianLian #ransomware group has added defi SOLUTIONS (defisolutions.com) to their victim list.#USA#BianLian #cti #cyberattack #darkweb #databreach -- FalconFeedsio
This lovely old lady is like a walking Millennium Bug just casing havoc where she goes with her computer-befuddling age. What a hero. -- joetidy
It gets better! Her daughter tells me this is the second time a computer has failed to believe her mum’s 1922 date of birth. Earlier on their connecting flight the crew didn’t come and help them off the plane with a wheelchair as the records showed she wo -- joetidy
I’m on a flight in US and an old lady has caused confusion, hilarity and then amazement as the crew expected her to be an infant. She is actually 101 and the computer can’t handle an age that high so just put her down as a 1 year old on the manifest. She -- joetidy
Learn about @pmelson's insights on running @ScumBots & monitoring platforms where threat actors collaborate, and why he expects attackers to start buying insider threats, in this Microsoft Threat Intelligence Podcast episode with host @sherrod_im: msft.it -- MsftSecIntel
OSINT : Utilize these tools to obtain someone’s information responsibly and ethically dlvr.it/T5ymk1 #OSINT #Medium -- osintbear
Understanding the OSI Model: A Comprehensive Overview dlvr.it/T5yjsn #OSINT #Medium -- osintbear
Reference Aid for OSINT Best Practices 2000–2024 dlvr.it/T5xwHj #OSINT #Medium -- osintbear
Unraveling the Secrets: A Deep Dive into Australian Signals Intelligence and Cybersecurity dlvr.it/T5xn9z #OSINT #Medium -- osintbear
My Experience as an Osint Coach — Tracelabs CTF dlvr.it/T5xfR2 #OSINT #Medium -- osintbear
My Mental Hacker MAP [MINDSET] dlvr.it/T5xNJk #OSINT #Medium -- osintbear
VacBan Stealer89ab0264f2da9c37933f11d49bfed3e2- Creal Stealer rebranded as VacBan Stealer- upload stolen data to gofile[.]iohttps://vacban[.]wtf#VacBanStealer #Stealer #IOC -- suyog41
Glitching the MediaTek MT8163V SoC BootROM with fault injection (2020)Credits Ilya Zhuravlev and Jeremy Boone (@NCCGroupInfosec)research.nccgroup.com/2020/1…#faultinjection #cybersecurity -- 0xor0ne
Great blog post by @ReynardSec_en on how to harden your #Docker platform. It's a step-by-step guide with a lot of useful tips and tricks. Check it out!reynardsec.com/en/docker-pla…#infosec -- 0xor0ne
This was an interesting research (2022) by @matthiasdeeg on reverse engineering of AES protected USB flash drives blog.syss.com/posts/hacking-…blog.syss.com/posts/hacking-…#hardware #infosec -- 0xor0ne
Related: x.com/ncsc/status/1783187671… -- bushidotoken
Throw back to this from @craiu lmao -- bushidotoken
⚠️ Cisco ASA & FTD Zero Day Vulnerabilities are now tracked as CVE-2024-20353 and CVE-2024-20359sec.cloudapps.cisco.com/secu… -- bushidotoken
Can’t imagine what Tigran is going through, scary stuff. Please share to raise awareness, at least 😢 -- bushidotoken
Unleash the power of effortless web data collection with the Easy Web Data Scraper extension!You can scrape valuable insights from any website and export any data you need.chromewebstore.google.com/de…#OSINT #CTI #intelligence #ThreatIntel #infosec #cyber -- DailyOsint
The tool has been in use for at least four years and possibly longer, and it has the ability to exploit a Windows Print Spooler vulnerability.Russian Group Forest Blizzard Deploying GooseEgg Tool to Exploit CVE-2022-38028 decipher.sc/russian-group-fo… #de -- DecipherSec
“The purpose of disruptions is to throw as much sand in the gears as possible." @tgrossman_ Ransomware Task Force: We Need to Disrupt Operations at Scale decipher.sc/ransomware-task-… #decipher #deciphersec -- DecipherSec
OFFATThe OWASP OFFAT tool autonomously assesses your API for prevalent vulnerabilities, though full compatibility with OAS v3 is pending. The project remains a work in progress, continuously evolving towards completiongithub.com/OWASP/OFFAT#bugbounty #pen -- hack_git
Our advice to anyone who wants to get a job in cyber security is to intentionally poop your pants in public.You need to put yourself in difficult situations to understand how to overcome adversity in the every expanding threat landscape. -- vxunderground
??? -- vxunderground
"IDS? Never heard of her – only thing I know is IBS (Irritable Bowl Syndrome)" - random neurotic guy on Discord -- vxunderground
This morning our Intrusion Detection System (meemaw) identified two (2) highly sophisticated Threat Actors trying to brute force our access portal.Viewer discretion advised -- vxunderground
Yesterday The New York Times unveiled that General Motor's had accidentally enrolled millions of people into its "OnStar Smart Driver+" program. If consumers chose to not enroll through the phone app – it would do it anyways.Unenrolling requires consumers -- vxunderground
Compilers, linkers, JITs and assemblers internals with focus on software security hardeningLow-Level Software Security for Compiler Developers:llsoftsec.github.io/llsoftse…#compilers #cybersecurity -- 0xor0ne
Let me save you, wanderer settings and privacy > muted words > add “look between” > saveHow to stay sane on the internet 🛡️ -- bushidotoken
Sharing some fresh CTI memes I made for a presentation -- bushidotoken
“Microsoft has observed Forest Blizzard using GooseEgg as part of post-compromise activities."Russian Group Forest Blizzard Deploying GooseEgg Tool to Exploit CVE-2022-38028 decipher.sc/russian-group-fo… #decipher #deciphersec -- DecipherSec
Change Healthcare Says Attackers Accessed PHI and PII decipher.sc/change-healthcar… #decipher #deciphersec -- DecipherSec
“Microsoft has observed that, after obtaining access to a target device, Forest Blizzard uses GooseEgg to elevate privileges within the environment."Russian Group Forest Blizzard Deploying GooseEgg Tool to Exploit CVE-2022-38028 decipher.sc/russian-group- -- DecipherSec
Group: ransomhubApprox. Time: 02:59 24/04/24Title: CYNC SOLUTIONS - The unexpected target.<Updated> -- RansomwareNews
github.com/elastic/protectio…github.com/elastic/detection… -- SBousseaden
Reposted to make tl;dr a little more accurate. Ran out of words to fit this into 1 single tweet.Avast believes* this is tied to Kimsuky group* -- vxunderground
Today Avast unveiled 'GuptiMiner'. tl;dr eScan AV, out of India, used HTTP for AV updates, not HTTPS, North Korea man-in-the-middle'd updates to large networks to deliver malware We give this APT campaign an A+ because it's absurdly well executeddecode -- vxunderground
Often time peoples forget how goofy antivirus companies used to be. For example: in the mid 2000's when the Kaspersky AV detected malware on your computer it would trigger "Kaspersky Alert Sound 2". It grabbed users attention immediately.See attached vide -- vxunderground
The United States FTC has banned non-compete agreements. We look forward to all of you creating a cyber security startupftc.gov/news-events/news/pre… -- vxunderground
Learning about malware development, reverse engineering, detection, etc. is an entire career field. It is not something you can watch a few YouTube videos on and be set.Either do it, or don't. The choice is yours. -- vxunderground
"How can I learn more about malware?"Our entire website is malware literature. Browse until something seems interesting and read it. If you don't understand it, search online until it makes sense or read a different paper.There is no easy route. Stop look -- vxunderground
There is heavy overlap with malware developers and video game cheat developers. When you follow this family tree you end up with the malware developers distant cousin – the video game modder.Anytime we visit our "distant cousins" we find the strangest thi -- vxunderground
-- vxunderground
捕まえた -- 58_158_177_102
世の中の役に立つ仕事なんだから、決して贅沢ではなくとも普通に生きていけるような仕組みを作ろうよ、と言っていた人が道半ばで倒れ、会社がなくなった頃からすると、今は業界としては凄くよい環境すぎるお前はそれを当たり前と思って驕るなよ、と言われそうな気はしている -- 58_158_177_102
削られ過ぎてこの世からいなくなった人が自分の身近にいたし、自分も昔は認識なく削る側だったとようやくわかるようになってきたし、そんな自分が削られるようになったのはある意味順番がきたとわかってはいるが、平気なわけではないからダメージの蓄積は大きい -- 58_158_177_102
New MadMxShell #malware spread via Google Ads.This campaign, which targets IP scanner searches, is the first time a sophisticated Windows backdoor has been spread via #malvertising.Read more 👇any.run/cybersecurity-blog/a… -- anyrun_app
Dropbox Lovermp.weixin.qq.com/s/BOTyH6YTm…genians.co.kr/blog/threat_in… -- blackorbird
Analyzing APT28 custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials(Windows Print Spooler Elevation of Privilege Vulnerability)microsoft.com/en-us/security… -- blackorbird
R O O T S H E L L Z I N B I O -- hackerfantastic
🐉🏴󠁧󠁢󠁥󠁮󠁧󠁿Happy St. George's Day!🏴󠁧󠁢󠁥󠁮󠁧󠁿🐉 -- hackerfantastic
#0day #GitLens Git Local Configuration Execution #Exploit #RCE 0day.today/exploit/descripti… -- inj3ct0r
#0day #FortiNet #FortiClient #EMS 7.2.2 / 7.0.10 #SQLi #Injection / Remote #CodeExecution #Exploit #RCE 0day.today/exploit/descripti… -- inj3ct0r
#0day #VisualStudio #CodeExecution #Exploit 0day.today/exploit/descripti… -- inj3ct0r
#0day #Gambio Online #Webshop 4.9.2.0 Remote #CodeExecution #Exploit 0day.today/exploit/descripti… -- inj3ct0r
#0day #PaloAltoNetworks #PANOS Unauthenticated Remote #CodeExecution #Exploit #RCE 0day.today/exploit/descripti… -- inj3ct0r
There's also this "Centex-Staking-Master-master.rar" some hours ago uploaded sample that is too detected by @ESET: a229e8df494cd747832f7884b9265771ed9d8b45d8efa9df5181e8f8fc69db9dI have no time to verify, but would bet that this too a real catch and not a -- malwrhunterteam
Downloading the "sports_platform_app" repo gives this "sports_platform_app-main.zip": 45c991529a421104f2edf03d92e01d95774bf54325f9107dd4139505912a0c1eAnd @ESET caught this one too.cc @pkalnai -- malwrhunterteam
Look for a "gift" in "sports_platform_app/backend/imageDetails.js" file... -- malwrhunterteam
Based on experts agreed that the recent "test_interview.zip" sample (nitter.no-logs.com/malwrhunterteam/…) was from North Korean actors, let me present you this @github account that should be related to them:https://github[.]com/TimothyGomez59168093@Shado -- malwrhunterteam
Anyone thinking I'm here to farm engagement go unfollow / block / etc as fast as you can, I... would say "could not care less", but it's more like "I'm happy to not have followers who not like what we tweet"...🤷‍♂️ -- malwrhunterteam
Seriously, I would very kindly suggest to the people who too got the blue checkmark complimentarily & went to hide it (especially the ones who "panicked") because "some people could think I have paid for it" to go talk with a doctor, because you have a pr -- malwrhunterteam
For the people dying hard to try convince people it is fake:- Who said it was real?- Even if it was real, we more hope it was a fake.- Something like this is not completely impossible, just read what people wrote in the replies.🤷‍♂️ -- malwrhunterteam
Yes, the condition is best defined as "Open box: An item in excellent, new condition with no wear".😂 -- malwrhunterteam
👀 -- malwrhunterteam
Something possibly interesting:"init\.sh" - FUD on VT: ec56f09edddd0c717b62f3d3179e00a7537fb2b10f4be90aad5ef49cff8c24cc->"systemNo1" - 2 detections on VT: 097bb9bbe6488e6d197b20a9f0d9dc064329deaafd45a86b85a51e68e88852b1systemig[.]xyz89.117.1[.]207🤔@cyb3ro -- malwrhunterteam
🤦‍♂️😂 -- malwrhunterteam
Some details/context about the sample here: -- malwrhunterteam
Related "test-task\.zip": f790ad0bfe7a465805b44264c88588e70eb3200806ac290150205a57d28d6b1a -- malwrhunterteam
👏👏👏 @windscribecom, just hope Apple won't take a "revenge" for this... -- malwrhunterteam
😂 -- malwrhunterteam
you wouldn’t last an hour in the asylum where they raised usATT&CK v15 is now streaming from your favorite TAXII servers or wherever STIX is served. @supremrobertson wrote a post about our latest era at medium.com/mitre-attack/atta… or visit the changelog -- MITREattack
Group: rhysidaApprox. Time: 16:56 23/04/24Title: Ministerio de Desarrollo Local -- RansomwareNews
Group: bianlianApprox. Time: 16:56 23/04/24Title: defi SOLUTIONS. -- RansomwareNews
Group: cactusApprox. Time: 08:49 23/04/24Title: ghimli.com\$189.1M\Australia\88GB\100%DISCLOSED -- RansomwareNews
Group: ransomhouseApprox. Time: 08:49 23/04/24Title: Bank Pembangunan Daerah Banten Tbk PT -- RansomwareNews
Group: abyssApprox. Time: 06:49 23/04/24Title: rangam.com -- RansomwareNews
Group: ransomhubApprox. Time: 04:53 23/04/24Title: HARMAN - CYNC SOLUTIONS client -- RansomwareNews
Group: ransomhouseApprox. Time: 01:06 24/04/24Title: Hirsh Industries -- RansomwareNews
Group: blacksuitApprox. Time: 20:54 23/04/24Title: octapharmaplasma.com/ -- RansomwareNews
Group: cactusApprox. Time: 18:59 23/04/24Title: xdconnects.com\$50.5M\Netherlands\1TB\100% DISCLOSED -- RansomwareNews
More details please check out the report:ti.qianxin.com/blog/articles… -- reddrip7
#APT #Storm-0978A new kernel injection technique (dubbed "Step Bear") was discoved in our tracking of "Operation Hidebear" campaign, which uses a custom message (0x405) for COM window (OleMainThreadWndClass) to trigger RPC, resulting in execution of CRX p -- reddrip7
Don't miss your chance to participate in our June virtual training! Our Adversary Tactics: Detection course builds on standard network defense & incident response by focusing on abnormal behaviors and the use of adversary TTPs.Register today 👉 ghst.ly/3T -- specterops
See BHE in action! Click through our demos & learn how it can help you:➡️ Identify & triage an Attack Path➡️ Explore detailed relationships that lead to Attack Paths➡️ Uncover critical Identity Attack Path Risk in AD CSLearn more: ghst.ly/3VwkpjJ -- specterops
We have new information out on the #CoralRaider threat actor, which we first disclosed a few weeks ago. The adversary has added 3 new information-stealing #malware to its arsenal and its expanding the number of users and geographies it targets cs.co/6016b -- talossecurity
📞 Contact Us Today to find out more about our educational discounts and how to integrate our labs into your learning path.💡 Explore. Learn. Excel. With DFIR Labs, you're not just studying; you're preparing for the future of cybersecurity.thedfirreport.com -- TheDFIRReport
🎓 Educational Discounts Available! We believe in making learning accessible, so we're offering special discounts to educational institutions and their students. It's the perfect opportunity to get hands-on experience with real intrusions.2/3 -- TheDFIRReport
🌟 Exciting News for Educators & Students! 🌟 👨‍🏫👩‍🎓 Are you a teacher looking to enhance your cybersecurity curriculum? Or a student eager to learn the skills needed in today's digital world? Our DFIR Labs offer real-world scenarios to test and improve you -- TheDFIRReport
👉 Curso Virtual de OSINT - Open Source Intelligence 2024. Domingos 5, 12, 19 y 26 de Mayo. De 9:00 am a 12:00 pm (UTC -05:00). #cybersecurity #hacking #readteam #bugbounty #forensics 🌐 Información detallada (PDF): reydes.com/archivos/cursos/C… ✅ Informaci -- Alonso_ReYDeS
Looking forward to #RSAC 2024! Visit booth #5762 May 6-9 to chat with @Fortinet's #cybersecurity experts, join live hands-on demos, and check out our in-booth theater for the latest on the #Fortinet #SecurityFabric. 🌐 ftnt.net/6018bvQ3e -- AMeggiottoFTNT
Islamic Cyber Team has defaced three Australian websites. All 3 are still defaced at time of posting.#cybersecurity #infosec #Auspol2024 #Australia -- Cyberknow20
''From Error to Entry: Cracking the Code of Password-Spraying Tools''#infosec #pentest #redteam #blueteamtrustedsec.com/blog/from-err… -- CyberWarship
SpaceX allegedly breached by Hunters International. @elonmusk @SpaceXh/t: @AlvieriD #CTI #Cybercrime #Cybersecurity #Cyberattack #Infosec #Ransomware #Malware -- DarkWebInformer
🚨Major Threat Alert: Cisco Zero-Day Exploit Code Goes Public: Patch Now or Face Total System Takeover - #CVE-2023-20198CVE-2021-1435CVE-2023-20198CVE-2023-20109Severity: ⚠️ CriticalMaturity: 💥 Mainstreamfletch.ai/p/cve-2023-20198#CyberSecurity #ThreatInte -- fletch_ai
🚨Major Threat Alert: SSLoad Malware Spread in Phishing Campaign - #TA578Severity: 🔴 HighMaturity: 💥 Mainstreamfletch.ai/p/ta578#CyberSecurity #ThreatIntel #InfoSec -- fletch_ai
📢Goby vulnerability updates,support one-click verification:#CVE-2024-4040:Authentication Bypass && Arbitrary File Read in CrushFTP#CrushFTP #hunterhow #infosec #infosecurity #Infosys #Vulnerabilitylearn more:github.com/gobysec/GobyVuls/… -- GobySec
For support and help, contact your favorite #Hacker fast and reliable. All social media#CyberSecurity #hacker #infosec #Snapchat #security #cyber #opensource #cybercrime #crime #gdpr #cloud #cloudsecurity #dataprotection #Privacy #Instagram #Tiktok #malwa -- GodsentTech
SEND ME A Dm🧑‍💻Your safety is guaranteed 100 %!! #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #yrkkh #naagin #infosec #hackathon #kalilinux #TargetedIndividuals #dollartreats #kryptovest #NFT #bcstorm #Hotbit #PENTAGON #aexcoin #chainbi -- GodsentTech
INBOX 📥 Me Your safety is guaranteed 💯%‼️ #elsed #bist100 #hisse #dizipal #astor #borsa #zagabet #rinabet #yrkkh #naagin #infosec #hackathon #kalilinux #TargetedIndividuals #dollartreats #kryptovest #NFT #bcstorm #Hotbit #PENTAGON #aexcoin #chainbil #USDT -- GodsentTech
If you need help recovering any account, emails, Tiktok, Snapchat, Instagram etc.I'm available 24/7 Send me an inbox #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld -- GodsentTech
Do you have a dedicated hacking job? DM and ask for my services. #hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX    #XboxShare #roblox #missingphone#gmailhack #gmaildown #hacked # -- GodsentTech
ransomware #alterworld If you need Help with recovering any Hacked Account, Mails, Tiktok, Snapchat, Instagram etc..I'm available 24/78Inbox me#hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld # -- GodsentTech
We have helped alot of people Recover their lost/ Hacked Account and Wallets etcInbox Us, if you need our Hacking Services.We are Available 24/7Inbox and Smile Again#Hacked #facebookdown #whatspp #hackedinstagram #twitterdown #lockedaccount #MetaMask #ran -- GodsentTech
Why banning TikTok will not solve data security challenges  Security Magazine dlvr.it/T622Zl #SecurityInsights #CyberSecurity #InfoSec -- iSecurity
Ethically Hacking is easy for specialists.DM for all cyber related problems.#hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX  #XboxShare #roblox #missingphone -- JacobNyeri
Ethically Hacking is easy for specialists.DM for all cyber related problems.#hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX  #XboxShare #roblox #missingphone -- JacobNyeri
Is there any Hacking attempts on your device?DM now for risk free security solutions.#hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord#XboxSeries× #XboxShare #roblox #missingphon -- JacobNyeri
Have exclusive Hacking jobs? and Ask for my service.#hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord#XboxSeries×#XboxShare #roblox #missingphone #gmailhack #gmaildown #hacked #Hacking -- JacobNyeri
Hacking is a lot easier when you connect with the right hacker. Get All Your Hacking Services Inbox Now I'm always available 24/7 #hacked #icloud #imessage #facebookdown #ransomware #snapchat #discord #havking #xboxshare #robloxseries #missingphone -- JacobNyeri
Hacking is easy,DM to Recover or Hack accounts and missing phones.#gmailhack#gmaildown #hacked #Hacking #hackaccount #hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX  #XboxShare #r -- JacobNyeri
Recover locked/lost accounts with ease,DM for all account retrievals.#gmailhack #gmaildown #hacked #Hacking #hackaccount#hacked #facebookdown #WhatsApp #hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware -- JacobNyeri
"사용자 정보를 탈취하는 CHM 악성코드 국내 유포" published by Ahnlab. #Kimsuky, #CHM, #CTI, #OSINT, #LAZARUS asec.ahnlab.com/ko/64612/ -- lazarusholic
We published #japanese version's report "MONTHLY #threat ACTOR GROUP #intelligence REPORT, FEBRUARY 2024" tinyurl.com/cxc4xpek #APT #Malware #cybercrime #threatintel #ThreatIntelligence #threathunting #phishing #vulnerability -- nshcthreatrecon
BloodyAD is an Active Directory Privilege Escalation Framework github.com/CravateRouge/bloo… #Pentesting #WebSecurity #Infosec -- ptracesecurity
Hackers have started a campaign to attack a critical vulnerability in WP Automatic Wordpress plugin#cybersecurity #threatintel #Wordpress #WPAutomaticbleepingcomputer.com/news/se… -- rfwaveio
North Korean hackers used fake job offers to deliver a new Trojan called Kaolin RAT. It can change file timestamps and load #malware - a gateway to the dangerous FudModule rootkit.Details here: thehackernews.com/2024/04/no…#cybersecurity #hacking -- TheHackersNews
Social media: a playground for cyber criminals! 🌐Read more: tweaklibrary.com/social-medi…#cybercrim #cybersecurity #ethicalhacking #hacking #hacker #malware #linux #technology -- TweakLibrary
Cops cuff man for allegedly framing colleague with AI-generated hate speech clip go.theregister.com/feed/www.… #infosec -- AI__TECH
The #Cybersecurity Spiral of Failure – (and how to break out of it)A must-read for top executives seeking to break patterns of frustration and breach around cybersecurity >> buff.ly/3RGMYHs#business #leaders #leadership #management #governance #CISO #CIO -- Corix_JC
How I escalated to admin through an import feature. The writeup is up.#pentesting #appsec #cybersecurity #infoseccristivlad.medium.com/privil… -- CristiVlad25
"🚨 New Threat Alert 🚨 Red Ransomware group surfaces, targeting various industries and international victims. Stay informed and protected with SOCRadar's defense strategy against ransomware. #Cybersecurity #Ransomware #ThreatIntelligence"ift.tt/IdR0DtC -- Cyber_O51NT
⚠️#OSINT⚠️BBOT (Bighuge BLS OSINT Tool) is a recursive internet scanner inspired by Spiderfoot, but designed to be faster, more reliable, and friendlier to pentesters, bug bounty hunters, and developers. Link in sub-post.#CTI #Darknet #DarkWeb #DarkWebInf -- DarkWebInformer
🚨DATA BREACH🚨Notorious threat actor, Ddarknotevil, allegedly has breached Weapon Systems Training Council🇺🇸 database.#Clearnet #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTICompromised Data: Names, Emails, Phone Numbers, A -- DarkWebInformer
🚨DATA BREACH🚨Notorious threat actor, Ynnian, allegedly has breached Russia's "Mr. CRAB."🇷🇺#Clearnet #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTI #Russia Compromised Data: store_id,address_id,customer_id,language_id,custo -- DarkWebInformer
⚠️#OSINT⚠️This is DaProfiler. It is an OSINT tool capable of tracing the digital identity of a target via social networks, emails, public information such as directories, business listings, etc. github.com/daprofiler/DaProf…#CTI #Darknet #DarkWeb #DarkWeb -- DarkWebInformer
⚠️URLScan⚠️is a powerful scanner technology that allows IT security and risk management professionals to analyze and understand the potential risks associated with a particular URL. Link in sub-post.#CTI #Darknet #DarkWebInformer #Cybercrime #Cybersecurit -- DarkWebInformer
⚠️#OSINT⚠️Nguessie Chendjou Therese Fabiola put together 26 different Information Gathering Tools. Very nice list and I use quite a few of these.#CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #Infosec -- DarkWebInformer
⚠️#BREAKING Allegedly, #RansomHub has named multiple victims.#Ransomware #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Malware #Infosec #CTIThreat Actor: RansomHubRansomware Victim: 2 VictimsDate: 2024-04-25 -- DarkWebInformer
⚠️I2PHIDES.ME⚠️allows you to browse or search the I2P network. It can be found on the #Clearnet and #DarkWeb#CTI #Darknet #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #OSINT #InfosecOnion: ml5oqtnuk5fj5sohpssh44rpqontkdxtkvwqkwsbcjri6xnxxvzrxo -- DarkWebInformer
⚠️#OSINT⚠️This is OnionSearch. OnionSearch is a Python3 script that scrapes URLs on different ".onion" search engines. Link in sub-post.#CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #Infosec #OnionSearch -- DarkWebInformer
⚠️#OSINT⚠️This is NetScout. NetScout is an OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL. Link in sub-post.#CTI #Darknet #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #OSINT #Infosec #NetScout -- DarkWebInformer
#Tech Friday returns to @55KRC tomorrow at 6:30 AM, join host @brianthomas1 and me for timely #technology news and tips. Listen at 550 AM or online. #cybersecurity #cybercrime #cyberwar #privacy #security #IoT #AI #surveillancecapitalism #respectdata #inf -- DaveHatter
A threat actor claims to be selling the database of Pondicherry University (pondiuni.edu.in) on a hackers' forum.#India#darkweb #cyberattack #databreach #cti -- FalconFeedsio
Learn how to bypass strict input validation on a web app that prevents you from sending RCE payloads. 🔥 ▶️ Oldie but a Goodie!Great read by the @secjuice teambuff.ly/3r9aQV5#hacking #cybersecurity #ethicalhacking #hacker #infosec #bugbounty -- grumpzsux
Advanced boolean-based SQLi filter bypass techniques 🔥 🔽 Oldie but a Goodie!Great read by the @secjuice teambuff.ly/2RjaJ9Y#bugbounty #hacking #cybersecurity #ethicalhacking #hacker #infosec #kalilinux #pentesting -- grumpzsux
why there is an RCE on Microsoft?#infoseccode.microsoft.com/pages/sys… -- h4x0r_dz
Pic of the Day#infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity -- hackinarticles
Pic of the Day#infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity -- hackinarticles
Atlassian の脆弱性 CVE-2023-22518:Linux 版 Cerber ランサムウェアの配布に悪用されているiototsecnews.jp/2024/04/17/l…#Atlassian #C3RB3R #Cerber #Confluence #CyberAttack #Exploit #Linux #Malware #Ransomware #Rapid7 #RAT #VmwareESXi #Vulnerability -- iototsecnews
Russia, Iran pose most aggressive threat to 2024 elections, say infoseccers  The Register dlvr.it/T61nkb #SecurityInsights #CyberSecurity #InfoSec -- iSecurity
Australian Federal Police on the hunt for new CISO  Cyber Daily dlvr.it/T61p52 #CyberSecurity #InfoSec #SecurityInsights -- iSecurity
El FBI advierte sobre nueva estafa de ‘Hacker Fantasma’ buff.ly/3UizXW4 #CyberSecurity -- josemiguelnovoa
Speaker wave 1 is up, and stay tuned for wave 2 on Monday + individual talks. #GenAI #infosec lineup covering automating offensive security, SOC ops, anti-misinfo, force protection, AI chips, vector DBs, function calling, AI firewalls/DLP, and that's not -- lmeyerov
Corrupto delincuente @VerVigilar81862 ABELARDO MORELO será q un extorsionista condenado por estafador es serio?Usted es un vulgar drogadicto extorsiona hasta al que vende tinto @FiscaliaCol investigue AG #CTI cómplices de esta rata para extorsionar. @kerg -- monteria190
The latest update for #Nable includes "Immutability with Cove Fortified Copies" and "A quick #MSP guide to pricing security—with a focus on N‑able #MDR". #Ncentral #RMM #Networks #Cybersecurity opsmtrs.com/3kEltj2 -- opsmatters_uk
The breach has been attributed to the notorious ransomware group Lockbit 3.0, which had previously set a deadline for the company to make contact and negotiate by April 16.#InsideOutsourcing #Tech #GlobalEmployment #Ransomware #Offshoring #Outsourcingnews -- outsourceaccel
CISA: CISA Releases Four Industrial Control Systems Advisories - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: CISA Releases Three Industrial Control Systems Advisories - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: CISA and Partners Release Advisory on Akira Ransomware - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: Oracle Releases Critical Patch Update Advisory for April 2024 - redpacketsecurity.com/cisa-o…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: Cisco Releases Security Advisories for Cisco Integrated Management Controller - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
CISA: CISA Releases Two Industrial Control Systems Advisories - redpacketsecurity.com/cisa-c…#CISA #OSINT #ThreatIntel #Cyber -- RedPacketSec
If you're like us, #ransomware is top of your mind heading into #RSAC this year. That's why Symantec's Eric Chien and Vikram Thakur will be discussing what our #ThreatHunters believe to be fueling the ransomware epidemic at RSAC on 5/8.Register here: bit. -- symantec
Mark Zuckerberg says Threads has 150 million monthly active users: ift.tt/Ql3IuVx by TechCrunch #infosec #cybersecurity #technology #news -- Alevskey
Thank you Secretary Aviation @Vumlunmang Vualnam @MoCA_GoI for interacting with @AmchamIndia members @SalilAnilGupte @Boeing_In @samitray7 @RTX_News for discussion on strengthening 🇺🇸🇮🇳 Aviation Partnership and the role of US Industry #MRO #collab #certif -- AmchamIndia
🇨🇦 celebrates a milestone achievement in multilateral #cybersecurity cooperation under its commitment to helping to build a safe, free and open cyberspace with ASEAN and Indo-Pacific partners. -- CanadaThailand
2024/04/25 12:47#イオンカード #フィッシングメール #Phishing ◆件名3月ご請求額のお知らせ◆リンクlalagpg[.]cn◆IP172.67.168[.]87☁104.21.78[.]186 -- catnap707
AI-controlled fighter jets now dogfighting with human pilots, marking a new era in military aviation tech. Meanwhile, UK's GPS tagging of migrants ruled illegal & Cisco faces government network breaches via hacked firewalls. #TechNews #AI #CyberSecurityBy -- CrazyAppIdeas
Brute force attacks remain a persistent threat in the ever-evolving landscape of cybersecurity. ⚠️Explore its various types and effective defense strategies. 💡Read our Article >> linkedin.com/pulse/fortifyin…#Cybersecurity #InfoSec #BruteForce #CyberThrea -- CyberNodeAU
⚠️FORUM⚠️This is 'XSS[.]is', it is a forum on the #Clearnet and #DarkWeb. It currently has registration closed, but it opens fairly often. You find a lot of threat actors and more on here. Onion in sub-post.#CTI #Darknet #DarkWebInformer #Cybercrime #Cybe -- DarkWebInformer
APT73 has a new Onion up at the following address: wn6vonooq6fggjdgyocp7bioykmfjket7sbp47cwhgubvowwd7ws5pyd[.]onion#Ransomware #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Malware #Infosec #CTI #APT73 -- DarkWebInformer
⚠️#OSINT⚠️This is DNSDumpster.com it is a FREE domain research tool that can discover hosts related to a domain. Domain example is one of INC Ransom's #Clearnet blogs.#CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #Infosec -- DarkWebInformer
⚠️#OSINT⚠️Hacker Combat™ put together a list of the 15 best Open-Source OSINT tools. I will link back some of these tools in future posts. Shodan is my favorite of all of these.#CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattac -- DarkWebInformer
SecWareX New Task Alert🚨Just be cautious of #phishing links in the comment section of @RenzoProtocol ⚠⚠⚠Remember to verify the official website at any time❗❗❗Finish #SecWareX task for up to 200 EB!🔗secwarex.io/task-detail/118 -- GoPlusSecWareX
Pic of the Day#infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity -- hackinarticles
Have exclusive Hacking jobs? DM and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking -- hacktprotech16
Have exclusive Hacking jobs? DM and Ask for my service. #hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking -- hacktprotech16
If you need Help recovering any Account, Mails, Tiktok, Snapchat, Instagram etc.I'm available for assistance#hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld#Hacked -- hacktprotech16
💀 Concerned about malware in PDFs or Office docs? #Sandbox analysis reveals threats (macros, suspicious images, & more) before you click. 🔥 Discover the static analysis: thehackernews.com/2024/04/ho…#SCADA Security:Unpacking the #Fuxnet #Malwareclaroty.co -- InfosecMonk
🎙✨ From Code to Cloud: Breaking Down Advanced Software Supply Chain Red Teaming Techniques@RedefiningCyber Podcast hosted by @sean_martin on @ITSPmagazine with guest Paul McCarty#SoftwareSupplyChain #RedTeaming #CyberSecurity 👇invidious.no-logs.com/watch? -- ITSPmagazine
Over 10M systems were infected with data-stealing #malware in 2023. Is your company's data secure?Explore our Digital Footprint Intelligence for comprehensive monitoring across the surface, deep & dark web, enabling you to prevent attacks.Learn more ⇒ kas -- kaspersky
#Phishing #SMBC #SMCC #三井住友カード IP:103.179.148.24(AS 140224 / STARCLOUD GLOBAL PTE., LTD. )hxxps://www.smcc-into.com -- KesaGataMe0
#ALERTA #Brasil🇧🇷⚠️Publican nueva víctima de #Darkvaultbzrastreador[.}com[.]br#ransomware #ciberseguridad #hacking #DataBreach #DarkWeb -- mbec03
#ALERTA #Brasil 🇧🇷⚠️Publican nueva víctima de #Qiulong hominemclinic[.]com[.]br⚠️5GB de Información sobre los problemas sexuales de los pacientes, datos personales y financieros.#ransomware #ciberseguridad #hacking #DataBreach #darkweb -- mbec03
ઘાટકોપરના ગુજરાતી યુવાનની જેમ તમે પણ કોઈ ‘પૂજા શાહ’ના ચક્કરમાં ફસાઈ નહીં જતા#Mumbai #Mumbainews #Mumbainewsupdates #Middaynews #Middaynewsupdates #Middayupdates #CyberSecurity #cybercrimegujaratimidday.com/news/mumb… -- middaygujarati
Ransomware-Angriff: Gewerbebetrieb in Bad Wörishofen #Ransomware #Einbruch #Erpressung #infosec #TeamInfoSec #cyberangriff security-incidents.de/sicher… -- SecIncidents
Have you invested in #yekf or #upamp? Don't hesitate to reach out for assistance! Feel free to send us a message now for help with #cryptocurrency, #cryptorecovery, #cryptoscam, #cryptoscamrecovery, #cybersecurity, #sucoinx, #bitkan, #kraken, #Gried, #hib -- W0ZNIAK_0UTREAC
Have you invested in #yekf or #upamp? Don't hesitate to reach out for assistance! Whether it's #cryptocurrency #cryptorecovery #cryptoscam or #cybersecurity concerns, feel free to message us now. #sucoinx #bitkan #kraken #Gried #hibtc #ftkieo #cryptbax #u -- W0ZNIAK_0UTREAC
🚨Actualización: #ElSalvador🇸🇻: El grupo de ransomware ransomhub vuelca los datos de la Sociedad de Ahorro y Crédito Constelación, S.A,@SACconstelacion. #ransomware #ransomhub #DarkWeb #SanSalvador #ElSalvador -- chum1ng0
🆕 Alert! 🚨 #Cisco Releases Security Updates Addressing ArcaneDoor, Vulnerabilities in Cisco Firewall Platforms. Update and review further guidance at: cisa.gov/news-events/alerts/… #cybersecurity #InfoSec -- CISACyber
Join @CrowdStrike + @AWS at #RSAC for a unique startup showcase on May 7th.Watch as the next wave of #cybersecurity leaders demonstrate how their innovation will transform tech.Secure your spot today: crwdstr.ke/6019bqB6l -- CrowdStrike
Don’t let scammers trick you with false rewards. Stay informed and secure! Follow Cyberdost now to protect yourself from online fraud and cybercrime.#I4C #MHA #Cyberdost #Cybersecurity #CyberSafeTips #Stayalert #newsfeed @virendersehwag @HMOIndia @FinMinI -- Cyberdost
GISEC - Day 2Our partners have helped us to find proper solutions for our customers. Hexagon IT Solutions - Right Solutions, Right Partner for your infrastructure security and application security.@hexagonits @skaditsolutions #security #cybersecurity #inf -- Daks1597
No experience, no problem ✋We're here to show you how to enter the #cybersecurity industry without experience! Don't forget to check our blog for more tips on landing your first career: okt.to/kIXdDf#HackTheBox #HTB #CyberCareers -- hackthebox_eu
Safeguarding your business is paramount!✅ Protect your data ✅ Secure your network ✅ Encrypt sensitive informationLearn more at integratedcybersecurity.ai/Call Us:- 224-483-3206#Illinois #SecureYourBusiness #Cybersecurity #Safe #Encrypt -- Integratecybers
#Phishing #SMBC #SMCC #三井住友カード IP:152.32.145.180(AS 135377 / UCLOUD INFORMATION TECHNOLOGY HK LIMITED )hxxps://26700.nethxxps://benehal.nethxxps://dllly.nethxxps://foldbook.nethxxps://jieyisheng.nethxxps://meitesibangweionline.nethxxps://mystgate.nethxxps -- KesaGataMe0
#Phishing #PayPay IP:103.158.37.174(AS 142032 / High Family Technology Co., Limited )hxxps://paypayjp.club -- KesaGataMe0
#Phishing #Mizuho #MizuhoFG hxxps://mizuhofinance37.top(AS13335 - CLOUDFLARENET) -- KesaGataMe0
🧐El proceso #electoral más grande en la historia de #México está en marcha. ⌛️👁️¡Descubre todo sobre las #matemáticaselectorales en el próximo # de @obsidiana_mex el 28 de abril en: obsidianadigital.mx 👀#Obsidiana #CienciayCulturaPorMéxico #CTI #STEM #últ -- LamanCarranza
#PeckShieldAlert #Phishing An address 0x5e08...96B3 has fallen victim to a phishing attack, resulting in a loss of ~69 $stETH (worth ~$219.7K) -- PeckShieldAlert
One of the world's largest #phishing operations, #LabHost, shut down by multinational law enforcement. hubs.li/Q02t_bJQ0 #cybercrime #Europol -- SecureWorld
🕵️‍♂️ Heads up! Researchers have uncovered a sneaky attack delivering #malware called SSLoad through phishing emails. This cunning malware infiltrates systems, steals sensitive data, and relays it back to the attackers.Read: thehackernews.com/2024/04/re…# -- TheHackersNews
"Crack the Bahubal behind strong passwords" Strong passwords are the key to keeping your digital castle safe! Remember to mix the characters, use numbers, and symbols to fortify your defenses against hackers. #CyberSecurity#ChooseAStrongPassword#MissionGr -- Uppolice
PeckShieldAlert: #PeckShieldAlert #Phishing An address 0x5e08...96B3 has fallen victim to a phishing attack, resulting in a loss of ~69 $stETH (worth ~$219.7K) -- web3_watchdog
Governments issue alerts after 'sophisticated' state-backed actor found exploiting flaws in Cisco security boxes go.theregister.com/feed/www.… #infosec -- AI__TECH
#Webinar Gratuito: "Análisis de Metadatos para OSINT". Jueves 2 de Mayo del 2024. De 10:00am a 10:45am (UTC -05:00). #cybersecurity #hacking #readteam #bugbounty #forensics #osint Registro Libre: reydes.com/d/?q=eventos -- Alonso_ReYDeS
estou online 24/7 Mande-me um email #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #Lockedaccount #metamask #ransomware #alterworld -- bigg_ray_cyber
24/7 أرسل لي بريدا الكترونيا #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #Lockedaccount #metamask #ransomware #alterworld -- bigg_ray_cyber
بريدا #hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld إذا كنت بحاجة إلى مساعدة في استعادة أي حساب تم اختراقه أو رسائل بريد إلكتروني أو Tiktok أو Snapchat أو Instagram وما إلى ذلك. -- bigg_ray_cyber
Have a friend or relative who could use some help staying safe online?One who falls for the latest phone scams?Gift them this book - it could save them thousands!➡️ a.co/d/iU05BRt#StaySafeOnline #phonescams #phishing #onlinesafety#NewRelease @BrenlynnJ -- books2delight
📢Just 2 more weeks to submit your talk at Dev Innovation Summi.. cc @DevNetwork_! cfptime.org/cfps/1828/ #cfp #infosec #DevNetwork_ -- cfp_time
The Cybersecurity #Leadership Handbook for the #CISO and the #CEOA must-have for anyone interested in learning how a comprehensive, integrated approach to #cybersecurity can help organizations build a robust, adaptive defense against #cyberthreatsbuff.ly/ -- Corix_JC
SecEng Newsletter #3 cyberfeed.io/article/1c87ff7… #cybersec #security #infosec #cybersecurity -- cyberfeedio
🚨ARREST🚨Founders And CEO Of Cryptocurrency Mixing Service, Samourai Wallet, Arrested And Charged With Money Laundering And Unlicensed Money Transmitting Offenses#DarkWeb #DarkWebInformer #Crypto #Cyberattack #Cybercrime #Mixer #Infosec #CTI #BreakingLink: -- DarkWebInformer
🚨DATA BREACH🚨Notorious threat actor, Ynnian, allegedly has breached Russia🇷🇺"Unified Settlement Center" dated 2023. 168,173 records of compromised data.#Clearnet #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTI #RussiaCompro -- DarkWebInformer
🚨URGENT🚨UNCONFIRMED; Allegedly, a Zero-day exploit for iMessage is up for sale. POC video for serious buyers. This user appears to be 'Team9Sandman'. #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTI #0Day #iOS #iMessage #Ex -- DarkWebInformer
⚠️TORDEX⚠️is an onion search engine. Disclaimer: There is banners on the front page that some people may be offended by. As with any onion search engine.. BE AWARE on what you search/click. Onion in sub-post.#CTI #Darknet #DarkWeb #DarkWebInformer #Cyberc -- DarkWebInformer
🚨DATA BREACH🚨Notorious threat actor, ShopifyGUY, allegedly has breached Piping Rock Health Products🇺🇸. There are 2,103,393 emails and 957,384 full customer details.#Clearnet #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTI C -- DarkWebInformer
⚠️#OSINT⚠️This is Cyberpunk OS.. it is a VM & has integrated different tools for investigations of information gathering in open sources (OSINT) about Fake News. #CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #Infosecgithu -- DarkWebInformer
Watch out for tax scams this time of year! 🚨 Remember, the IRS primarily contacts you by regular mail, never email, text, or social media. Always be mindful when sharing personal and financial information. bit.ly/3JAvZ6k #TaxScams #Phishing #IRS -- EideBaillyLLP
RansomHouse #ransomware group has added Hirsh Industries (hirshindustries.com) to their victim list.#USA#RansomHouse #cti #cyberattack #darkweb #databreach -- FalconFeedsio
8 strange ways emproyees can (accidently) expose databit.ly/3M633Dj#DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing#Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- HacksGeorge
Is mandatory password expiration helping or hurting your password security?#DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- HacksGeorge
Hacking is a lot easier when you connect with the right hacker. Get All Your Hacking Services Inbox Now I'm always available 24/7 #hacked #icloud #imessage #facebookdown #ransomware #snapchat #discord #havking #xboxshare #robloxseries #missingphone👾 -- HacksGeorge
#Phishing #MUFG #三菱UFJ銀行IP:117.52.18.147(AS 3786 / LG DACOM Corporation )hxxps://0ljrlz6.duckdns.orghxxps://0nlaa2fw.duckdns.orghxxps://1ehmekzz.duckdns.orghxxps://2080tf3.duckdns.orghxxps://24l39b.duckdns.orghxxps://2gy5pi.duckdns.orghxxps://2nlv6xliw.du -- KesaGataMe0
"Monthly Threat Actor Group Intelligence Report, February 2024 (JPN)" published by NSHC. #Trend, #SectorA, #CTI, #OSINT, #LAZARUS redalert.nshc.net/2024/04/24… -- lazarusholic
"Nation-State Threat Actors Renew Publications to npm" published by Phylum. #NPM, #macOS, #CTI, #OSINT, #LAZARUS blog.phylum.io/north-korean-… -- lazarusholic
"You've been notifiedby a hospitalthat your informationwas stolen. Now what?"#ransomware #cybersecurity#CDNhealthcbc.ca/news/canada/windsor/w… -- michalsz
Certified in Cybersecurity Exam - What is a Security Policy? invidious.no-logs.com/Vbc5-hbY94c**#cissp #infosec #cybersecurity #security #cyber #informationsecurity #tech #technology #bigtech #cloudsecurity #ccsp #certifiedincybersecurity -- Notes_Theory
Back to #RaptorTeaming, the 1st part 📚The free pdf downloads can be accessed here: theredteaming.co.uk/raptor-t…The #AI art engines have been released since we've first addressed #cybersecurity 💻The AI websites are very much unregulated & pose the highest -- Polk_Azov
If you need Help with recovering any Hacked Account, Mails, Tiktok, Snapchat, Instagram etc.. 24/7I'm available Inbox me#hacked #facebookdown #whatsapp #hackedinstagram #twitterdown #lockedaccount #metamask #ransomware #alterworld -- WESTHACKER045
None of that xdJust add html tags like "><img src=//callback> If you get a hit, then try blind, Most backend are filtered xd#bugbounty #infosec -- akita_zen
hxxps://craxsrat.com/193.222.96.215#android #malware #craxsratMalicious > UNKNOW AS-203168 -- banthisguy9349
These engineering and IT degrees for the future are your passport to an in-demand career working on the big issues of our time.careerswithstem.com.au/3-hot…#CareerswithSTEM #engineering #IT #AI #artificialintelligence #renewableenergy #cybersecurity #tech -- CareerswithSTEM
🛡️#Windows users: We added #CVE-2022-38028 to our Known Exploited Vulnerabilities Catalog. Visit go.dhs.gov/Z3Q & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec -- CISACyber
En el mundo del phishing, los #estafadores son como sombras digitales, acechando en línea para atrapar a las víctimas desprevenidas y robar su información personal. ¡No caigas en su trampa! #Phishing #Ciberseguridad -- comprabien_info
Russian hackers continue to exploit stolen Microsoft source code, targeting email systems in ongoing attacks linked to the SolarWinds breach. In other news, X (formerly Twitter) is launching a TV app to enhance video content delivery. #CyberSecurity #Tech -- CrazyAppIdeas
#Censys Query for #Lazarus #APTservices.http.response.body_hashes="sha256:e74dc1314bdb5dee30e2882734167dbdb82667346a54d38170212c953787b08c"Infra:147.124.212[.]89147.124.214[.]129147.124.214[.]131147.124.214[.]23767.203.7[.]17167.203.7[.]245@500mk500 #Malw -- Cyberteam008
🚨DATA BREACH🚨Notorious threat actor, Ynnian, allegedly has breached Japan's🇯🇵 "Fashion Evolution Network" dated 2021. 51,845 compromised records were leaked.#Clearnet #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTICompromis -- DarkWebInformer
The seller of this Zero-day has dropped the price to $150,000. What a steal! 🤣#DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTI #0Day #ZeroDay #Windows #Exploit -- DarkWebInformer
⚠️VormWeb⚠️is a Tor search engine that started in 2020. You can browse either in English or German.#CTI #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #OSINT #InfosecHave an Onion: volkancfgpi4c7ghph6id2t7vcntenuly66qjt6oedwtjm -- DarkWebInformer
🚨DATA BREACH🚨Threat actor, sedapmalam, allegedly has breached Tunas Toyota Jakarta Indonesia🇮🇩. There is a total of 4,359 records.#Clearnet #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTICompromised Data:- ID- USER ID- PHON -- DarkWebInformer
In #cybersecurity, stream processing is a vital tool. Fast detection enables immediate follow-up actions. 🔎 Discover how DeltaStream efficiently identifies suspicious login activity from a stream of login events.deltastream.io/detecting-sus… -- DeltaStreamInc
🚨Major Threat Alert: CVE-2024-2848: Actively Exploited Vulnerability Found in Popular Responsive WordPress ThemeCVE-2024-2848Chatter: 🟡 MediumMaturity: 💢 Emergingfletch.ai/p/cve-2024-2848#CyberSecurity #ThreatIntel #InfoSec -- fletch_ai
WEB WORLD CAN BE DANGEROUS. TAKE CONTROL OF YOUR ONLINE SAFETY. DON’T FALL FOR IT! KEEP YOUR INFORMATION SECURE.IF YOU ARE A VICTIM OF CYBER FRAUD DIAL 1930 or VISIT: WWW.cybercrime.gov.in#gscb #cybercrime #cyberattack #nevershare #phishing #BeAwareBeSafe -- GSCBank
Become a Bug Hunter:Resources:- Programming language - Technologies prerequisites - Learning - Books - YouTube channels#BugBounty #bugbountytips #bughunting #infosec #ethicalhacking #CyberSec -- InfosecMonk
-ランサムウェア攻撃 アラート-公開日時: 2024-04-24被害企業: ​CYNC SOLUTIONS - The unexpected target.​<Updated>​ランサムグループ: ransomhub#Cybersecurity #サイバーセキュリティ #Ransomware #ランサムウェア1713931802 -- IntelVictims
Cyber-attack leaves Leicester street lights permanently on  BBC.com dlvr.it/T5wm5T #SecurityInsights #CyberSecurity #InfoSec -- iSecurity
Automating a more resilient supply chain ift.tt/MW5eSGq #Security #Cyber #Cybersecurity -- Jmw66
Is your company working to implement Zero-Trust strategies for cybersecurity? Learn the three big mistakes the experts often see people running into. #ZeroTrust #Cybersecurity hubs.la/Q02tJTG90 -- Matrium_Tech
Se reabre el caso Pegasus en España a petición de una investigación francesa. En @vulnexsl hace años que lo tenemos analizado en detalle con nuestra plataforma @BinSecSweeper File Threat Intelligence Platform. #pegasus #ciberseguridad #fileintel #threati -- simonroses
Text me now for any hacking or bypass Active 24/7#anyomous#sadapwhatsapphack #hackinstagrammurah#facebook #hackerstayaway #hackingout#accounthacking #mobilehacking #hackgmail#hacksnapchat #blackhathacker #hackerindia #phishing #Phish #Hackedgmail -- Skipper00011
Watch #GoogleCloudConsulting VP Lee Moore on Bloomberg TV sharing the new #GoogleCloudCertificate program and courses in gen AI, #cybersecurity, and #DataAnalytics that expand onramps to economic opportunity with colleges, universities, & employers💡 googl -- ttakanas
🚨#BREAKING Allegedly, #BlackSuit has named a new victim.#Ransomware #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Malware #Infosec #CTICountry: #USA🇺🇸Threat Actor: Black SuitCompany: Octapharma PlasmaIndustry: Blood & Organ BanksReven -- DarkWebInformer
"APT-C-28(ScarCruft)组织利用恶意LNK文件投递RokRat攻击的活动分析" published by Qihoo360. #APT-C-28, #RokRAT, #LNK, #CTI, #OSINT, #LAZARUS mp.weixin.qq.com/s?__biz=MzU… -- lazarusholic
El grupo #Rhysida #ransomware afirma haber #hackeado a Ministerio de Desarrollo Local de #ElSalvador (@desarrollosv) 🇸🇻….Mantente informado en #VenariX venarix.com -- _venarixES_
Security analysis and reverse engineering of IoT devices and debugging with GhidraExcellent series by @ArtResiliaPart 1: artresilia.com/iot-series-i-…Part 2: artresilia.com/iot-series-ii…Part 3: artresilia.com/iot-series-ii…Part 4: artresilia.com/iot-seri -- 0xor0ne
8 Weird Ways Employees Can (Accidentally) Expose Data #DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing#Ransomware #Cybersecurity #Cyberattack #Dataprotection#DataBreach #Hacked #Infosec!! -- Anders_HackTech
Does mandatory password expiration help or hurt your password security?#DataSecurity #Privacy#100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection#DataBreach #Hacked #Infosec -- Anders_HackTech
"Threat actor offers massive database of Chinese iPhone and Huawei users for sale, incl. 62.5M iPhone records and 13.8M Huawei records. Sold at $6200 and $1300 respectively, with payment via cryptocurrencies for anonymity. #CyberSecurity #DarkWeb #DataBr… -- Cyber_O51NT
🚨CRUSHFTP🚨This repository contains files related to CVE-2024-4040 (CrushFTP VFS escape).#DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTI #CrushFTP #CVE20244040github.com/airbus-cert/CVE-2… -- DarkWebInformer
⚠️#OSINT⚠️"These OSINT tools are not just for intelligence professionals. Marketers, researchers, security analysts, risk manager & even every internet user can uncover insights, verify facts & stay informed."#CTI #Clearnet #DarkWeb #DarkWebInformer #Cybe -- DarkWebInformer
⚠️#OSINT⚠️DarkGPT is an artificial intelligence assistant based on GPT-4-200K designed to perform queries on leaked databases. GitHub link is in the sub-post!#CTI #Clearnet #Darknet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #OSINT -- DarkWebInformer
🚨DATA BREACH🚨Notorious threat actor, Ynnian, allegedly has breached Ukraine🇺🇦 Pharmacy "Lekpharm" dated 2021. 9,070,838 records were leaked.#Clearnet #DarkWebInformer #DarkWeb #Cybersecurity #Cyberattack #Cybercrime #Infosec #CTI Compromised Data: Card Nu -- DarkWebInformer
⚠️Darknet Market Bible⚠️is a bible for buyers on Darknet Markets. It aims to cover every step that someone should take in order to buy securely from DNMs.#CTI #Clearnet #DarkWeb #DarkWebInformer #Cybercrime #Cybersecurity #Cyberattack #InfosecHave an Onio -- DarkWebInformer
Offering the best hacking, infiltration and recovery services on all social media accounts. #NFT#hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware#gmailhack #gmaildown #hacked #Hacking #hackaccount #Facebook #coinbasesupport #walletphrase -- GodsentTech
Lost your account and need a recovery but don't know how? All you need is a hacker to do the job?Inbox me for help on how to recover your account with immediate effect.#hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapcha -- GodsentTech
Have exclusive Hacking jobs?DM and Ask for my service.#hacked #icloud #facebookdown #imessage #ransomware #snapchat #snapchatsupport #snapchatleak #hacking #discord #XboxSeriesX #XboxShare #roblox #missingphone#gmailhack #gmaildown #hacked #Hacking #hacka -- GodsentTech
8 strange ways employees can (accidently) expose data🧨bit.ly/3M633Dj#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- GodsentTech
Is mandatory password expiration helping or hurting your password security?🧨bit.ly/3UZnwhl#DataSecurity #Privacy #100DaysOfCode #CloudSecurity#MachineLearning #Phishing #Ransomware #Cybersecurity#CyberAttack #DataProtection #DataBreach #Hacked #Infosec -- GodsentTech
Offering the best recovery services on all social media account hackings, infiltration and recovery.#hackedinstagram #TwitterDown #lockedaccount #metamask #ransomware #USDT #BUSD #SEGA #Crypto -- GodsentTech
🟠 #Phishing Alert 🟠 🇦🇪#UAE: A report from a user in the United Arab Emirates alerts us that a phishing campaign is currently underway, impersonating Microsoft support.As can be clearly seen (among other things), the sender's address is "micrasoft-onedrive -- H4ckManac
DarkGPTDarkGPT is an OSINT assistant based on GPT-4-200K designed to perform queries on leaked databases, thus providing an artificial intelligence assistant that can be useful in your traditional OSINT processes.github.com/luijait/DarkGPT#OSINT #cybersec -- hack_git
A Detailed Guide on Ligolo-Nghackingarticles.in/a-detaile…#infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountyti -- hackinarticles
OSCP advice from a panda for whoever needs it🐼 @offsectraining #offsec #pentesting #offensivesecurity #oscp #hacker #infosec #certificationinvidious.no-logs.com/watch?v=8msiutE_… -- hacksbearywell
-ランサムウェア攻撃 アラート-公開日時: 2024-04-24被害企業: ​Hirsh Industries​ランサムグループ: ransomhouse#Cybersecurity #サイバーセキュリティ #Ransomware #ランサムウェア1713924601 -- IntelVictims
#Phishing #SMBC #SMCC #三井住友カード IP:103.179.148.24(AS 140224 / STARCLOUD GLOBAL PTE., LTD. )hxxps://www-sancome.comhxxps://www.swbc-pass.com -- KesaGataMe0
#Phishing #mercari #メルカリ IP:181.214.58.30 / 181.214.58.37 (AS 201670 / S.c. Infotech-grup S.r.l. )hxxps://help-jp.duckdns.orghxxps://help-jp1.duckdns.orghxxps://help-jp2.duckdns.orghxxps://help.a911.tophxxps://help.dybchat.tophxxps://help.xiongxiong.top -- KesaGataMe0
#Phishing #MUFG hxxps://www.help-mufg.tokyo/(AS13335 - CLOUDFLARENET) -- KesaGataMe0
#Phishing #SMBC #SMCC #三井住友カード IP:23.95.246.231(AS 36352 / AS-COLOCROSSING )hxxps://jdfdash.comhxxps://jdfgh.comhxxps://jdfgk.comhxxps://jdfgo.comhxxps://jhjga.comhxxps://jhjgc.comhxxps://jhjgd.comhxxps://jhjgfgcom.comhxxps://aixin369.comhxxps://botuwang. -- KesaGataMe0
#Phishing #ekinet #えきねっと IP:165.22.249.193(AS 14061 / DIGITALOCEAN-ASN )hxxps://www.longin-eki.co.jp.snuk5g.cnhxxps://www.eki.longin.co.jp.nhji5g.cnhxxps://www.longin.co.jp-admin.vzi6ed.cnhxxps://www.longin-eki.co.jp.snul6f.cnhxxps://www.admin-longin.co.j -- KesaGataMe0
#Phishing #MUFG #三菱UFJ銀行 IP:117.52.18.147(AS 3786 / LG DACOM Corporation )hxxps://0btql611n.duckdns.orghxxps://0cxcxf.duckdns.orghxxps://1omcoy.duckdns.orghxxps://1ppvu2g4.duckdns.orghxxps://1xu22pise.duckdns.orghxxps://22p5tcsq.duckdns.orghxxps://235yqwi -- KesaGataMe0
Stay ahead of cyber threats! Deloitte's Annual Cyber Threat Trends Report highlights the most impactful and trending threat actors, including LockBit and Volt Typhoon. Understand the evolving tactics and protect your business. #CyberSecurity #DeloitteCTI -- MAUMITASAHA1
Email is failing us - Time for a ChangeEmail has had it's day. It's utility has been corrupted due to social engineering. We have to begin to adopt other avenues of communication before cyber threats force us back to pen and paper.#Cybersecurity #DigitalT -- MetaAwareness
Cybersecurity Mastery - Full Course in 38 Hours#security #cybersecurity #programming #developer #morioh #programmer #coding #coder #webdev #webdeveloper #webdevelopment #softwaredeveloper #computersciencemorioh.com/p/f26f0320a465?f=… -- moriohdotcom
Another useful thing that sqlmap has is the Google Dorking flag. Combine with your favorite dork increase change finding SQLi:sqlmap -g 'site:target.com inurl:\".php?id=1\"'#SQLi #infosecurity #cybersecurity -- ott3rly
Attacking an EDR Part 1: riccardoancarani.github.io/2… Part 2: riccardoancarani.github.io/2…#Pentesting #CyberSecurity #Infosec -- ptracesecurity
2 tips if you are doing #phishing tests.1⃣ Use Spoofy from @Nightbanes. github.com/MattKeeley/Spoofyspoofy -d <domain.tld>Will tell you about the SPF and DMARC policy settings. Will also warn you if too many SPF lookups. The limit is 10 and above that can -- sekurlsa_pw
Authorities from 19 countries raided 70 addresses around the world, making 34 arrests and shutting down #LabHost, a #phishing-as-a-service platform which was previously available on the open web➡️ scmagazine.com/news/authorit… #cybersecurity w./ @SCMagazi -- Stormshield
Hackers infect users of antivirus service that delivered updates over HTTP arstechnica.com/?p=2019398&u… #cybersecurity #computerscience #computerengineering -- TheCyberSecHub
#ThreatProtection #ProtectionHighlight Untrusted downloads open the door to a myriad of online threats. Symantec Download Insight combined with File Reputation and SONAR Behavioral Analysis provides real time protection: broadcom.com/support/securit… #Cyb -- threatintel
We’re launching the most complete support for #Ransomware, from protection to response and recovery, with the acquisition of Coveware. Read how we’re on a mission to deliver world-class cyber incident response >> bit.ly/4b7tZhn -- Veeam_APAC
!!सभी वीएलई सावधान रहें !!कृपया किसी भी अनजान लिंक पर क्लिक करने या ऐप्स डाउनलोड करने से बचें.संवेदनशील जानकारी साझा करने या कोई ऐप डाउनलोड करने से पहले अपने डीएम/डीसी या स्टेट के नोडल अधिकारी से सलाह लें, अन्यथा आप वित्तीय धोखाधड़ी का शिकार हो सकते हैं.# -- virat_nv