Aggregator
FirmwareDroid: An analysis framework for Android firmware and Apps.
FirmwareDroid is a research project that aims to develop novel methods to analyse Android firmware. It is mainly made to automate the process of extracting and scanning pre-installed Android apps for security research purposes....
The post FirmwareDroid: An analysis framework for Android firmware and Apps. appeared first on Penetration Testing Tools.
Fofa Viewer: simple FOFA (cyberspace search engine) client
Fofa Viewer A simple FOFA client written in JavaFX Features Support tabs Feature-rich Context Menu on items Export query result into Excel spreadsheet Manually set max query count pre-query for non-premium users (Change the...
The post Fofa Viewer: simple FOFA (cyberspace search engine) client appeared first on Penetration Testing Tools.
Lynx
You must login to view this content
DASCTF 2025上半年赛 Writeup by Mini-Venom
打造数字化转型安全基座,威努特赋能乳品智造升级
SDL 75/100问:前期的安全设计与测试是否解决不同层面问题?
CoinMarketCap briefly hacked to drain crypto wallets via fake Web3 popup
Threat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025
During exercises at CognectCon2025 a number of cyberattack scenarios were discussed that highlighted the risks of cyber attackers leveraging cognitive vulnerabilities to cause major impacts to nation critical infrastructures.
This video is a short report-out on one such possible scenario, before we began discussing how to prevent, detect, and respond to such an event. In hindsight, the scenario seems pretty timely and relevant.
The premise of this scenario was if Iran found itself outmatched militarily by Israel and the US, how it could conduct a strategic cyberattack against its enemies by leveraging useful idiots to launch a distributed attacks with a self-replicating destructive worm against all 16 US Critical Infrastructure sectors.
The aggressor would launch a disinformation and influence campaign targeting westerners who want the violence in the middle east to stop and believe that a social ‘Like’ viral campaign will make that happen. Instead, they become unknowing distribution points for a malicious worm that attacks the very infrastructure they rely upon.
Such conferences are vitally important. Communication and collaboration among cybersecurity professionals, such as these exercises, fuel creativity and innovation needed to predict and prepare against future cyber-attacks. Understanding how cognitive vulnerabilities are both a weakness and an opportunity in cybersecurity is the next significant area for our industry.
For more cybersecurity insights, follow me:
- LinkedIn: https://www.linkedin.com/in/matthewrosenquist/
- YouTube: https://www.youtube.com/CybersecurityInsights
- Substack: https://substack.com/@matthewrosenquist
- Cybersecurity Insights: https://www.cybersecurityinsights.us/
The post Threat Casting a Nation State Attack on Critical Infrastructure Scenario at CognectCon2025 appeared first on Security Boulevard.
python原型链污染
Qilin ransomware gang now offers a “Call Lawyer” feature to pressure victims
Feel Reassured with Advanced Secrets Scanning Technologies
Are You Ready for the Future of Cybersecurity? Cybersecurity is not just about human identities anymore. A rising segment of digital focuses on non-human identities (NHIs) – a crucial feature in any contemporary cybersecurity strategy. But what are NHIs, and why should we be paying attention to them? Navigating the Landscape of Non-Human Identities A […]
The post Feel Reassured with Advanced Secrets Scanning Technologies appeared first on Entro.
The post Feel Reassured with Advanced Secrets Scanning Technologies appeared first on Security Boulevard.