Security
Amazon EKS vs Azure Kubernetes Service
Managed Kubernetes services help organizations deploy, configure, and manage Kubernetes clusters. This article compares two of the biggest service providers:...
Jeeves – Time-Based Blind SQLInjection Finder
Jeeves is made for looking to Time-Based Blind SQLInjection through recon. - Installation & Requirements: Installing Jeeves $ go...
Threat actors exploit recently disclosed Atlassian Confluence flaw in cryptomining campaign
Threat actors are exploiting the recently disclosed CVE-2022-26134 RCE in Atlassian Confluence servers to deploy cryptocurrency miners. CheckPoint researchers have...
WhatsApp spam offers up “B&Q Father’s Day Contest 2022”
Father’s Day in the UK (June 19) is almost upon us, and scammers are taking advantage of it—and the fractional...
Experts spotted a new variant of the Cuba Ransomware with optimized infection techniques
The Cuba ransomware operators are back and employed a new version of its malware in recent attacks. Cuba ransomware has...
PacketStreamer – Distributed Tcpdump For Cloud Native Environments
Deepfence PacketStreamer is a high-performance remote PacketStreamer sensors collect raw network packets on remote hosts. It selects packets to capture...
Vice Society ransomware gang adds the Italian City of Palermo to its data leak site
The Vice Society group has claimed responsibility for the ransomware attack that hit the Italian city of Palermo forcing the...
Blackbird – An OSINT Tool To Search For Accounts By Username In 101 Social Networks
Blackbird An Setup Clone the repository git clone https://github.com/p1ngul1n0/blackbirdcd blackbird Install requirements pip install -r requirements.txt Usage Search by username...
Symbiote, a nearly-impossible-to-detect Linux malware
Researchers uncovered a high stealth Linux malware, dubbed Symbiote, that could be used to backdoor infected systems. Joint research conducted by...
Cloud data breaches: 4 biggest threats to cloud storage security
Just about anywhere you look, organizations are using the cloud in some form—and they’re not all large enterprises. Small and...
Previously undocumented Aoqin Dragon APT targets entities in Southeast Asia and Australia
Researchers spotted a previously undocumented Chinese-speaking APT, tracked as Aoqin Dragon, targeting entities in Southeast Asia and Australia. SentinelOne documented a...
ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
Earlier this year Malwarebytes released its 2022 Threat Review, a review of the most important threats and cybersecurity trends of...
Facebook users targeted in massive phishing campaign
Facebook is once again the launchpad for a large-scale phishing campaign, according to researchers at PIXM. The campaign, which first...
BlackBasta is the latest ransomware to target ESXi virtual machines on Linux
BlackBasta, an alleged subdivision of the ransomware group Conti, just began supporting the encryption of VMware’s ESXi virtual machines (VM)...
Offensive-Azure – Collection Of Offensive Tools Targeting Microsoft Azure
Collection of offensive tools targeting Microsoft Azure written in Python to be platform agnostic. The current list of tools can...
Update now! Patch against vulnerabilities in Meeting Owl Pro and Whiteboard Owl devices
After a decent amount of pressure, Owl Labs has finally released updates for vulnerabilities in Meeting Owl, and Whiteboard Owl...
Apple’s passkeys attempt to solve the password problem
The recent Apple Worldwide Developers Conference (WWDC) revealed another teasing of what has been referred to as “the end of...