Aggregator
AI 迷思录:应用与安全指南
雅虎数据泄露事件:黑客涉嫌兜售60.2万个电子邮件账户
North Korea's Kimsuky Taps Trusted Platforms to Attack South Korea
Bypassing Microsoft Login Pages: Frameless BITB’s Innovative Approach
Frameless BITB A new approach to Browser In The Browser (BITB) without the use of iframes, allows the bypass of traditional framebusters implemented by login pages like Microsoft. This POC code is built for...
The post Bypassing Microsoft Login Pages: Frameless BITB’s Innovative Approach appeared first on Penetration Testing Tools.
FindFunc: IDA PRO plugin to find code functions
FindFunc: Advanced Filtering/Finding of Functions in IDA PRO FindFunc is an IDA PRO plugin to find code functions that contain a certain assembly or byte pattern, reference a certain name or string, or conform...
The post FindFunc: IDA PRO plugin to find code functions appeared first on Penetration Testing Tools.
AD-AssessmentKit: comprehensive security audits and network mapping of AD environments
AD-AssessmentKit These tools are ideal for network administrators and cybersecurity professionals seeking to assess and enhance the security posture of AD environments and network infrastructures. AD-SecurityAudit.sh It focuses on initial reconnaissance and vulnerability identification...
The post AD-AssessmentKit: comprehensive security audits and network mapping of AD environments appeared first on Penetration Testing Tools.
Winnti APT41 组织通过 RevivalStone 网络间谍活动瞄准日本公司
新型 FrigidStealer 恶意软件通过假浏览器更新攻击 macOS 用户
面向数据科学家开发人员的 14 个加密货币 API
新 OpenSSH 漏洞导致中间人攻击和拒绝服务攻击
API Security Matters: The Risks of Turning a Blind Eye
Live Webinar | Evaluating Cybersecurity Proposals – The Secret Formula
Live Webinar | The Future of Manufacturing IT: Trends & Best Practices
Clinical Trial Database Exposes 1.6M Records to Web
An unsecured database containing 2 terabytes of data allegedly exposed more than 1.6 million clinical research records to the internet, including sensitive personal and medical information of patients, said the security researcher who discovered the lapse. Why does this keep happening?
North Korea Stealing Cryptocurrency With JavaScript Implant
New North Korean malware is targeting crypto wallets with an unconventional command-and-control infrastructure and through malware embedded into a GitHub repository that's apparently the account of a Pyongyang hacker. The implant appears to have emerged late last December.
Dream Raises $100M to Strengthen AI-Driven National Security
Dream raised $100 million in Series B funding from Bain Capital on a $1.1 billion valuation to enhance its proprietary Cyber Language Model and expand globally, with a focus on U.S. market entry to address growing national security threats through AI-driven cybersecurity and predictive solutions.
DOGE Team Wins Legal Battle, Retains Access to Federal Data
A federal judge has ruled against a lawsuit from 14 state attorneys general requesting a temporary restraining order against Elon Musk and the Department of Government Efficiency amid controversy surrounding the billionaire's access to sensitive government systems.