Multiple flaws in Fortinet FortiWeb WAF could allow corporate networks to hack
An expert found multiple serious vulnerabilities in Fortinet’s FortiWeb web application firewall (WAF) that could expose corporate networks to hack....
An expert found multiple serious vulnerabilities in Fortinet’s FortiWeb web application firewall (WAF) that could expose corporate networks to hack....
The U.S. government is going to launch the ‘Hack the Army 3.0’ bug bounty program in collaboration with the HackerOne...
The US DoJ revealed that threat actors behind the SolarWinds attack have gained access to roughly 3% of the department’s...
WhatsApp is notifying users that starting February 8, 2021, they will be obliged to share their data with Facebook, leaving...
Google released an Android security update that addressed tens of flaws, including a critical Android remote code execution vulnerability. Google...
The all-in-one Red Team browser extension for Web PentestersHackTools, is a web extension facilitating your web application penetration tests, it...
Improvements made to the Goals and SLAs wizardWe’re excited to announce that creating a goal or SLA in InsightVM just...
Researchers uncovered a malspam campaign that spreads the QNode remote access Trojan (RAT) using fake Trump’s sex scandal video as...
Threat actors are attempting to hack Zyxel devices exploiting the recently disclosed vulnerability CVE-2020-29583, security researchers warn. The Taiwanese vendor...
A joint statement issued by US security agencies confirmed that Russia was likely the origin of the SolarWinds supply chain...
Researchers uncovered a large scale operation targeting cryptocurrency users with a previously undetected multiplatform RAT named ElectroRAT. Security researchers from...
MaskPhish is a simple script to hide phishing URL under a normal looking URL(google.com or facebook.com).Legal Disclaimer:Usage of MaskPhish for...
drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It...
Welcome to the NICER Protocol Deep Dive blog series! When we started researching what all was out on the internet...
According to a new report published by Check Point, organizations in the healthcare industry have faced a 45% increase in...
The gaming industry under attack, Over 500,000 credentials for the top two dozen leading gaming firms, including Ubisoft, leaked on...
A German security researcher demonstrated how to break, once again, the Google Audio reCAPTCHA with Google’s own Speech to Text...
At-home laboratory services provider Apex Laboratory discloses a ransomware attack and consequent data breach. Apex Laboratory, Inc. is a clinical...
This is a tool that allows you to offensively use YARA to apply a filter to the events being reported...
Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in...
When it comes to offloading security controls to the cloud, it may seem counterintuitive to the notion of “securing” things....
A British court has rejected the request of the US government to extradite Wikileaks founder Julian Assange to the country....
Security expert spotted a new piece of malware that leverages weaponized Word documents to download a PowerShell script from GitHub. Security...
MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. Features:Verification Service { Check...