Yearly Archives: 2021
Vulnerability Spotlight: Use-after-free condition in Google Chrome could lead to code execution
IEMLabs -
Cisco Talos recently uncovered a vulnerability in Google Chrome that can be exploited.
Chrome is a cross-platform web browser, while Chromium is the open-source version...
EUROPEAN MONEY MULE ACTION LEADS TO 1 803 ARRESTS
IEMLabs -
A recent investigation revealed money mules were laundering profits from online fraud schemes such as business email compromises and forex scams. Europol today wrapped...
Nerdbug: While sleeping, go on a hunt.
IEMLabs -
Nuclei automation script in its whole, with a reasonable explanation.
An automation application that gets CHAOS project discovery data every hour, compares it to the...
DalFox: Parameter Analysis and XSS #Scanning tool based on GOlang (Finder Of #XSS).
IEMLabs -
Dalfox is a DOM (Document Object Model) parser-based parameter analysis and Cross-site Scripting (XSS) scanner. SQL injection (SQLi), Server-Side Template Injection (SSTI), and open-redirects...
WIRTE Hacker Group Targets Government, Law, Financial Entities in Middle East
IEMLabs -
As early as 2019, a covert malware campaign used malicious Microsoft Excel and Word documents to target government, diplomatic agencies, military groups, law firms,...
Addressing the cybersecurity skills gap with higher education
IEMLabs -
There is an exponential growth in the field of cyber security over the past decade. At the same time, there is no simultaneous growth...
OffensiveAutoIt: — Notes and experiments on offensive tooling in AutoIt v3.
IEMLabs -
Why will you go for AutoIt?
There are numerous examples of AutoIt being used for malware development on the internet, but no generic resource...
Fuzz Testing Tool
IEMLabs -
Fuzz tool is one of the automated software intends for testing purpose. In the world of cybersecurity, this Fuzz tool helps to detect the...
Compromised Cloud Accounts Lead to Cryptomining
IEMLabs -
Cloud computing is causing the world to shift to cloud environments, which means there is a threat of increasing cyber-attacks. Google has found recent...
PoW Shield: — With proof of work and an additional WAF, this project aims to combat #DDoS and spam
IEMLabs -
PoW Shield, which acts as a proxy between the backend service and the end-user, uses proof of work to protect the #osi application layer...