Sunday, May 19, 2024

Yearly Archives: 2022

CRT: — CrowdStrike Reporting Tool for Azure

  This tool searches the Azure AD/O365 tenancy for the following configurations: One that can reveal hard-to-find permissions and configuration settings. Assisting enterprises in safeguarding...

Hackers Using Device Registration Trick to Attack Enterprises with Lateral Phishing

Microsoft has revealed the details of a multi-phase, large-scale phishing effort that leverages stolen credentials to register devices on a victim's network in order...

Top 16 Marketing Automation Solutions

Every business can benefit from marketing automation. How do you choose the right solution for your business? This guide will compare and contrast today's...

Enum4Linux-ng

  This is a next-generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Designed for security professionals and CTF players. Features: ...

FACT:– Firmware Analysis and Comparison Tool

  The Firmware Analysis and Comparison Tool (previously Fraunhofer's Firmware Analysis Framework (FAF)) aims to automate the majority of the firmware analysis process. It decompresses...

New Strategy Funds UK Public Services’ Cyber Resilience

The government will give local authorities in the United Kingdom 37.8 million pounds to improve cyber resilience in vital public services and data in...

VMware Warns of Log4j Attacks Targeting Horizon Servers

VMware is advising customers to patch their VMware Horizon instances after a recent round of assaults leveraging the Log4Shell flaw. The security hole, known as...

New Threat Group Exploits Zoho Flaws in U.S Orgs

Hackers are attempting to take advantage of a recently patched serious vulnerability in Zoho's ManageEngine ADSelfService Plus, which might allow them to execute code...

Telegram Becomes Viable Alternative to the Dark Web, Here’s How Attackers are Exploiting It

Telegram, a widely used messaging app, has emerged as a viable alternative to dark web forums. Threat actors are increasingly misusing the internet to...

VulnLab:– A Web Vulnerability Lab Project.

 Main Vulnerabilities:- Injection of SQL data Cross-Site Scripting (XSS) Injection of Commands Direct Object References That Aren't Secure (IDOR) Forgery of Cross-Site Requests (CSRF) ...

Most Read

Write For Us