Latest Hacking News-- TikTok and WeChat users in the United States might suffer in the coming days due to the authorities’ latest decision. US Department of Commerce Bans TikTok and WeChat Transactions on Latest Hacking News. View original article on Latest Hacking News
Mozilla Sunsets Firefox Send; Firefox Notes To Follow
Latest Hacking News-- Earlier this year, Mozilla’s file-sharing product Firefox Send made it to the news due to its exploitation for malware distribution. Mozilla Sunsets Firefox Send; Firefox Notes To Follow on Latest Hacking News. View original article on Latest Hacking News
A New Hacking Group Hitting Russian Companies With Ransomware
The Hacker News-- As ransomware attacks against critical infrastructure continue to spike in recent months, cybersecurity researchers have uncovered a new entrant that has been actively trying to conduct multistage attacks on large corporate networks of medical labs, banks, manufacturers, and software developers in Russia. The ransomware gang, codenamed "OldGremlin" and believed to be a Russian-speaking … Continue reading A New Hacking Group Hitting Russian Companies With Ransomware
FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) – A Distributed Evolutionary Binary Fuzzer For Pentesters
KitPloit - PenTest Tools!-- FLUFFI - A distributed evolutionary binary fuzzer for pentesters. About the project High level overview Getting started Usage HOWTOs Technical Details Contributing to FLUFFI LICENSE Bugs found So far, FLUFFI was almost exclusively used on SIEMENS products and solutions. Bugs found therein will not be published. However, FLUFFI found the following … Continue reading FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) – A Distributed Evolutionary Binary Fuzzer For Pentesters
Ransomware Causes a Death, Mozilla Sends Off FireFox Send – ThreatWire
Combining Hadoop and MCollective for total network compromise
InfoSec Write-ups - Medium-- This is the story of how only two insecure configurations allowed us to take down an entire cloud hosted company. It was a gray box pentest for a relatively big client, in which we were tasked with assessing the security of about 5 development endpoints, accessible only using a client certificate. … Continue reading Combining Hadoop and MCollective for total network compromise
Unsecured Microsoft Bing Search Server Exposed User Queries and Location Data
The Hacker News-- A back-end server associated with Microsoft Bing exposed sensitive data of the search engine's mobile application users, including search queries, device details, and GPS coordinates, among others. The logging database, however, doesn't include any personal details such as names or addresses. The data leak, discovered by Ata Hakcil of WizCase on September 12, is … Continue reading Unsecured Microsoft Bing Search Server Exposed User Queries and Location Data
GRAT2 – Command And Control (C2) Project For Learning Purpose
KitPloit - PenTest Tools!-- GRAT2 is a Command and Control (C2) tool written in python3 and the client in .NET 4.0. The main idea came from Georgios Koumettou who initiated the project.Why we developed GRAT2 ? We are aware that there are numerous C2 tools out there but, we developed this tool due to curiosity … Continue reading GRAT2 – Command And Control (C2) Project For Learning Purpose
British Hacker Sentenced to 5 Years for Blackmailing U.S. Companies
The Hacker News-- A UK man who threatened to publicly release stolen confidential information unless the victims agreed to fulfill his digital extortion demands has finally pleaded guilty on Monday at U.S. federal district court in St. Louis, Missouri. Nathan Francis Wyatt , 39, who is a key member of the infamous international hacking group … Continue reading British Hacker Sentenced to 5 Years for Blackmailing U.S. Companies
Fun with header and forget password — without that nasty twist
InfoSec Write-ups - Medium-- This one doesn’t have that awful caveat compared to my other article :) Playing around with headers is important during bug hunting. But…Continue reading on InfoSec Write-ups » View original article on InfoSec Write-ups - Medium




