Aggregator
弗吉尼亚大学 | FLASH:基于可信度图的证明式学习的综合入侵检测方法
New Google Pixel AI feature analyzes phone conversations for scams
N1CTF24 PHP Master Writeup
Cybersecurity Education Needs a Team: Better Partner Up!
Across the security landscape, partnerships are becoming a cornerstone in developing agile, prepared professionals who can not only react to threats but anticipate and neutralize them. Here's how universities, certification bodies, boot camps and industry leaders can drive the industry forward.
Feds Warn of Godzilla Webshell Threats to Health Sector
Godzilla webshell, a Chinese-language backdoor known for its stealth and ability to execute commands and manipulate files, is publicly available on GitHub, and federal authorities have issued a stern warning to the healthcare sector to prepare for this threat and inevitable cyberattacks.
Schneider Electric Warns of Critical Modicon Flaws
French multinational Schneider Electric disclosed critical vulnerabilities in its Modicon M340, Momentum and MC80 programmable automation controllers. The vulnerabilities could allow unauthorized access, data manipulation and system interruptions.
US Prosecutors Charge Hackers in Snowflake Data Theft
The Justice Department unsealed an indictment against alleged hackers Connor Moucka and John Binns, accusing them of stealing data from the cloud platform Snowflake, extorting millions in bitcoin and stealing sensitive personal information from over 165 organizations and millions of individuals.
1Password’s New Co-CEO Model to Drive Growth, Security Focus
With a new co-CEO model, 1Password's Jeff Shiner and David Faugno align product and operational leadership to build on the extended access management platform. Focusing on global partnerships and expansion, the company targets enhanced security for diverse workplace environments.
Randall Munroe’s XKCD ‘Number Shortage’
Safer with Google: New intelligent, real-time protections on Android to keep you safe
Go — ing Rogue: The Malware Development Odyssey (Part III)
Privilege Escalation Techniques for Ethical Hackers
Mend.io is a Strong Performer in the Forrester Wave™ Software Composition Analysis, Q4 2024
Mobile Application Penetration Testing Checklist
五眼联盟警告,零日漏洞利用正在成为“新常态”
黑客声称近 5 亿 Instagram 用户的数据被抓取
MSI Analyzer: Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers
MSI Analyzer This Python script for Linux can analyze Microsoft Windows *.msi Installer files and point out potential vulnerabilities. It was developed by Michael Baer (@derbaer0) in the SEC Consult Vulnerability Lab. Currently, it...
The post MSI Analyzer: Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers appeared first on Penetration Testing Tools.
volatility 3: The volatile memory extraction framework
Volatility 3: The volatile memory extraction framework Volatility is the world’s most widely used framework for extracting digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system...
The post volatility 3: The volatile memory extraction framework appeared first on Penetration Testing Tools.
OWASP Nettacker: Automated Penetration Testing Framework
OWASP Nettacker project is created to automate information gathering, vulnerability scanning, and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP,...
The post OWASP Nettacker: Automated Penetration Testing Framework appeared first on Penetration Testing Tools.