The informed voter’s guide to election cyberthreats

Malwarebytes Labs-- Singapore held its most recent general election on July 10 2020, and although they used the electoral system called first-past-the-post (FPTP), a scheme favored by the US, UK, and most English-speaking countries, the road leading to Election Day was not without challenges and obstacles. While all voters used paper ballots (thus removing the … Continue reading The informed voter’s guide to election cyberthreats

Avcleaner – C/C++ Source Obfuscator For Antivirus Bypass

KitPloit - PenTest Tools!-- C/C++ source obfuscator for antivirus bypass.Builddocker build . -t avcleanerdocker run -v ~/dev/scrt/avcleaner:/home/toto -it avcleaner bash #adapt ~/dev/scrt/avcleaner to the path where you cloned avcleanersudo pacman -Syumkdir CMakeBuild && cd CMakeBuildcmake ..make -j 2./avcleaner.bin --helpUsageFor simple programs, this is as easy as:avcleaner.bin test/strings_simplest.c --strings=true --However, you should know that you're using … Continue reading Avcleaner – C/C++ Source Obfuscator For Antivirus Bypass

New Linux Malware Steals Call Details from VoIP Softswitch Systems

The Hacker News-- Cybersecurity researchers have discovered an entirely new kind of Linux malware dubbed "CDRThief" that targets voice over IP (VoIP) softswitches in an attempt to steal phone call metadata. "The primary goal of the malware is to exfiltrate various private data from a compromised softswitch, including call detail records (CDR)," ESET researchers said … Continue reading New Linux Malware Steals Call Details from VoIP Softswitch Systems

New Unpatched Bluetooth Flaw Lets Hackers Easily Target Nearby Devices

The Hacker News-- Bluetooth SIG—an organization that oversees the development of Bluetooth standards—today issued a statement informing users and vendors of a newly reported unpatched vulnerability that potentially affects hundreds of millions of devices worldwide. Discovered independently by two separate teams of academic researchers, the flaw resides in the Cross-Transport Key Derivation (CTKD) of devices … Continue reading New Unpatched Bluetooth Flaw Lets Hackers Easily Target Nearby Devices

Report: Pandemic caused significant shift in buyer appetite in the dark web

Malwarebytes Labs-- Last year, credentials for PayPal, Facebook, and Airbnb were among the top goods on high demand in the dark web, aka the Internet’s underground market. But due to the COVID-19 outbreak, with most of the worldwide population sheltering, working, and studying indoors, many facets of life have made a full 180-degree turn—including the … Continue reading Report: Pandemic caused significant shift in buyer appetite in the dark web

Spyre – Simple YARA-based IOC Scanner

KitPloit - PenTest Tools!-- ...a simple, self-contained modular host-based IOC scannerSpyre is a simple host-based IOC scanner built around the YARA pattern matching engine and other scan modules. The main goal of this project is easy operationalization of YARA rules and other indicators of compromise.Users need to bring their own rule sets. The awesome-yara repository … Continue reading Spyre – Simple YARA-based IOC Scanner

Hackers Stole $5.4 Million From Eterbase Cryptocurrency Exchange

The Hacker News-- Cybercriminals successfully plundered another digital cryptocurrency exchange. European cryptocurrency exchange Eterbase this week disclosed a massive breach of its network by an unknown group of hackers who stole cryptocurrencies worth 5.4 million dollars. Eterbase, which has now entered maintenance mode until the security issue is resolved, described itself as Europe's Premier Digital … Continue reading Hackers Stole $5.4 Million From Eterbase Cryptocurrency Exchange

Safety – Check Your Installed Dependencies For Known Security Vulnerabilities

KitPloit - PenTest Tools!-- Safety checks your installed dependencies for known security vulnerabilities.By default it uses the open Python vulnerability database Safety DB, but can be upgraded to use pyup.io's Safety API using the --key option.InstallationInstall safety with pip. Keep in mind that we support only Python 3.5 and up. Look at Python 2.7 section … Continue reading Safety – Check Your Installed Dependencies For Known Security Vulnerabilities