MUI – A GUI Plugin For Binary Ninja To Easily Interact With And View The Progress Of Manticore
With the State Graph WidgetShows the provenance tree for a certain state selected in the list widget. Tab can be...
With the State Graph WidgetShows the provenance tree for a certain state selected in the list widget. Tab can be...
Researchers spotted a new botnet named Abcbot hat that mainly targeted Chinese cloud hosting providers over the past months. Security...
A Russian national was extradited to the US from Switzerland after he was charged for trading information stolen from hacked...
Web Cache Vulnerability Scanner (WCVS) is a fast and versatile CLI scanner for web cache poisoning developed by Hackmanit.The scanner...
Microsoft warns of a couple of Active Directory flaws fixed with the November 2021 Patch Tuesday updates that could allow takeover of...
Enhance your RequirementsGo 1.16+jqistioInstallationgit clone https://github.com/chen-keinan/mesh-kridikcd mesh-kridikmake buildNote: mesh-kridik require root user to be executedQuick StartExecute Mesh-Kridik without any flags...
Google found more than 35,000 Java packages in the Maven Central repository that are impacted by flaws in the Apache...
Uptycs researchers have observed attacks related to miners, DDOS malware and some variants of ransomware actively leveraging LogforShell flaw in...
DarkWatchman is a new lightweight javascript-based Remote Access Trojan (RAT) that uses novel methods for fileless persistence. Recently Prevailion experts...
The FBI warns that zero-day flaw in Zoho’s ManageEngine Desktop Central has been under active exploitation by nation-state actors since October. The Federal...
Mariana Trench is a security focused The issue tells you that Mariana Trench found a remote code execution in MainActivity.onCreate...
The Belgian defense ministry was hit by a cyber attack, it seems that threat actors exploited the Log4Shell vulnerability. The...
An alleged APT group planted a backdoor in the network of a U.S. federal government commission associated with international rights....
A fully automated, accurate, and extensive scanner for finding DescriptionWe have been researching the Log4J RCE (CVE-2021-44228) since it was...
Security researchers devised a new attack vector exploiting the Log4Shell vulnerability on servers locally by using a JavaScript WebSocket connection....
Detects Log4J versions on your file-system within any application that are vulnerable to CVE-2021-44228 and CVE-2021-45046. It is able to...
Clop ransomware gang stolen confidential data from the UK police and leaked it in the dark web because the victim...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The TellYouThePass ransomware resurged and exploits the Apache Log4j flaw (Log4Shell) to target both Linux and Windows systems. Researchers from...
My Cloud OS firmware is reaching the end of support, Western Digital customers have to update their WD My Cloud...
Multiple flaws in the Log4J library are scaring organizations worldwide while threat actors are already exploiting them. 2.17 is the...
A cyber attack hit four affiliated online sports gear sites and resulted in the theft of credit cards for 1,813,224...
The Conti ransomware gang is the first ransomware operation exploiting the Log4Shell vulnerability to target VMware vCenter Servers. Conti ransomware gang is...
VMware released security patches for a critical server-side request forgery (SSRF) vulnerability in Workspace ONE UEM console. VMware has addressed...