Aggregator
群晖自建密码库
群晖自建密码库
群晖自建密码库
群晖自建密码库
群晖自建密码库
Lawsuit: Amazon Violated Washington State Health Data Law
A proposed class action lawsuit alleges that Amazon is unlawfully collecting and tracking mobile users' data - including sensitive geolocation - in violation of Washington State's My Health My Data Act. It's the first such lawsuit filed since the data privacy law went into effect last year.
UK Delays Plans for AI Regulation
The British Labour Government has reportedly delayed plans to put forward a draft bill on artificial intelligence over concerns that binding AI regulation could stifle the country's AI growth potential. A spokesperson said the government remains "committed to bringing forward a legislation."
Elon Musk's Federal Worker Email Sparks 'Security Nightmare'
The Department of Government Efficiency-led effort to assess whether millions of federal jobs are necessary through a bulleted list of weekly activities is causing a major security threat, in addition to mass confusion across the federal government, experts told Information Security Media Group.
Australia Fines Telegram for Delays in Violent Content Probe
Australia regulators on Monday fined social networking company Telegram nearly 1 million Australian dollar for delaying its response to questions on how the company regulates violent, extremist and child sexual content on its platform. Telegram was the only media firm to miss the May 6 deadline.
GitVenom 恶意软件利用虚假 GitHub 项目窃取比特币,金额达 456,000 美元
Uscrapper: powerful OSINT webscraper for personal data collection
Uscrapper Introducing Uscrapper 2.0, A powerful OSINT web scrapper that allows users to extract various personal information from a website. It leverages web scraping techniques and regular expressions to extract email addresses, social media...
The post Uscrapper: powerful OSINT webscraper for personal data collection appeared first on Penetration Testing Tools.
2500 多种 Truesight.sys 驱动程序变体被利用来绕过 EDR 并部署 HiddenGh0st RAT
CACTER直播预告:EDLP-邮件多场景管控,为企业审批减负
InflativeLoading: Dynamically convert a native EXE to PIC shellcode
InflativeLoading Background Converting an exe to shellcode is one of my goals, in this way, some security tools like Mimikatz can be used with more flexibility. Though some tools like Donut already achieved it, I still...
The post InflativeLoading: Dynamically convert a native EXE to PIC shellcode appeared first on Penetration Testing Tools.
ioctlance: detect various vulnerability types in Windows Driver Model (WDM) drivers
IOCTLance Presented at CODE BLUE 2023, this project titled Enhanced Vulnerability Hunting in WDM Drivers with Symbolic Execution and Taint Analysis introduces IOCTLance, a tool that enhances its capacity to detect various vulnerability types in Windows Driver...
The post ioctlance: detect various vulnerability types in Windows Driver Model (WDM) drivers appeared first on Penetration Testing Tools.