Friday, September 22, 2023

Yearly Archives: 2022

New Activities of RIG Exploit Kit Observed

  One of the exploit kits that is frequently used to spread different infections is RIG. The kit, first discovered in 2014, has the unusual...

CopperStealer Malware is Spreading Through Fake Cracks

A new version of the CopperStealer virus, which targets computers by infecting them with false cracks for software and programmes, has been discovered. Cyber...

IYPS

  A password strength test tool that provides information on strength, anticipated crack times, warnings, and tips for creating stronger passwords. Features:- Completely open source Fully offline...

MalSCCM

MalSCCM is a tool used to deploy malicious applications by abusing local or remote SCCM servers. Attack Sequence: Use locate to discover management server while...

Nivistealer

Steal photographs of the victim, their precise position on a device, and much more. Features:- Take victim's I.P. Information about the stealth device Battery and...

69phisher

  Simple and user-friendly automated phishing page creator. Phishing that is undetected by Chrome and uses the try.cloudflare tunnel. An automated phishing tool for beginners with more...

Phishing Kits, Credential Theft, and Social Media Scam Trends Q1 2022

  This year, phishing assaults have changed in unanticipated ways in addition to rising in volume. Phishing assaults are spread across several online platforms, according...

Crypto Scammers Turn to LinkedIn to Target Victims

  Scams using cryptocurrencies have been reported by the FBI on LinkedIn. The fact that bitcoin frauds may target top executives makes them a serious...

Fake Voicemail Campaign Steals Microsoft 365 Credentials

  Multiple American firms' Microsoft Office 365 and Outlook login credentials are the focus of a phishing effort. Attackers are utilising phoney voicemail notifications with...

Fzshell:– Fuzzy shell completions you didn’t know you needed

  A fuzzy command line completer called fzshell retrieves completions from user-defined sources. Why does that matter? It implies that you may now design unique...

Most Read

Write For Us