Monday, May 6, 2024

Yearly Archives: 2022

SGXRay:– Automating Vulnerability Detection for SGX Apps.

With hardware-based memory encryption, Intel SGX safeguards segregated application logic and sensitive data inside an enclave. Using a hardware-based security mechanism like this necessitates a...

Pwndora

Create Your Own IoT Search Engine At Home With This Massive IPv4 Scanner. Find And Analyze Internet-Connected Devices In Minutes. Features: Scanning of ports with...

Mandiant-Azure-AD-Investigator

  Artifacts that may be indicative of UNC2452 and other threat actor activity are detected using a PowerShell module. Features: Signing Certificate with an Unusual Validity...

US Data Breaches Surge 68% to All-Time High

By the recent data from the Identity Theft Resource Center, the number of publicly disclosed data intrusions in the United States increased by 68...

New DDoS IRC Bot Spreads Through Korean WebHard

A GoLang-programmed IRC (Internet Relay Chat) bot strain is being used to perform distributed denial-of-service (DDoS) attacks against Korean users. Researchers at AhnLab's Security Emergency-response...

SECMON:– Infosec Watching Tool.

SECMON is a web-based solution for automating information security monitoring and vulnerability management. Features:— Email notification when a new CVE is issued that affects your product list Email alerts when "cyber-security" news is released, such as new threats, recent assaults, events, and so on. Create a visual representation of the high-risk goods on your IT infrastructure. Download the CVE Excel report for a specific date range. Showcase the most important cybersecurity topics (Light cyber landscape) Logs that are simple to integrate into a SIEM (verified on Splunk and Graylog) Check out the most recent CVEs as well as cybersecurity-related headlines. Assign a CVE's management status buffer. Look up all of a CVE's specifics. See if there's an exploit for a CVE on Github or Exploit-DB. Look for security flaws in a certain product. ...

Karton:– Distributed #malware processing framework based on #python , Redis and MinIO.

Karton is a powerful framework for building malware analysis backends that are both flexible and lightweight. With relatively little effort, it can be used...

Will ransomware gangs see flow of cash throttled by Russia cryptocurrency restrictions?

The Bank of Russia, Russia's central bank, presented broad suggestions this week to limit the country's cryptocurrency ecosystem. Because a large component of the...

Disruptive Attacks in Ukraine Likely Linked to Escalating Tensions

Website defacements, WhisperGate wiper software assaults, and DDoS attacks targeting Ukrainian organisations were most likely motivated by geopolitical tensions. Researchers from Secureworks® Counter Threat UnitTM...

Attackers Exploit Corporate Infrastructure for Credentials on ICS Networks

While the ever-changing technological landscape has brought the IT and OT sides of the organisation closer together, it has also exposed ICS networks to...

Most Read

Write For Us