Latest Hacking News-- Heads up Pulse Secure VPN users! Researchers have found numerous vulnerabilities in Pulse Secure VPN that can have devastating impact Numerous Vulnerabilities Found In Pulse Secure VPN – Update Now! on Latest Hacking News. View original article on Latest Hacking News
Lucifer Malware Comes Back Targeting Linux Systems
Latest Hacking News-- Lucifer malware emerged a couple of months ago as a typical Windows malware. However, it has now returned with even Lucifer Malware Comes Back Targeting Linux Systems on Latest Hacking News. View original article on Latest Hacking News
Canadian Firm Canpar Express Becomes Ransomware Attack Victim
Latest Hacking News-- A Canadian shipping company, Canpar, has emerged as the latest prey to a ransomware attack. The incident caused huge business Canadian Firm Canpar Express Becomes Ransomware Attack Victim on Latest Hacking News. View original article on Latest Hacking News
73: WannaCry
Darknet Diaries-- It is recommend to listen to episodes 53 “Shadow Brokers”, 71 “FDFF”, and 72 “Bangladesh Bank Heist” before listening to this one.In May 2017 the world fell victim to a major ransomware attack known as WannaCry. One of the victims was UK’s national health service. Security researchers scrambled to try to figure out how to stop it … Continue reading 73: WannaCry
DVS – D(COM) V(ulnerability) S(canner) AKA Devious Swiss Army Knife
KitPloit - PenTest Tools!-- Did you ever wonder how you can move laterally through internal networks? or interact with remote machines without alerting EDRs?Let's assume that we have a valid credentials, or an active session with access to a remote machine, but we are without an option for executing a process remotely in a known, … Continue reading DVS – D(COM) V(ulnerability) S(canner) AKA Devious Swiss Army Knife
Apple’s notarization process fails to protect
Malwarebytes Labs-- In macOS Mojave, Apple introduced the concept of notarization, a process that developers can go through to ensure that their software is malware-free (and must go through for their software to run on macOS Catalina). This is meant to be another layer in Apple’s protection against malware. Unfortunately, it’s starting to look like … Continue reading Apple’s notarization process fails to protect
Lock and Code S1Ep14: Uncovering security hubris with Adam Kujawa
Malwarebytes Labs-- This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Adam Kujawa, security evangelist and director of Malwarebytes Labs, about “security hubris,” the simple phenomenon in which businesses are less secure than they actually believe. Ask yourself, … Continue reading Lock and Code S1Ep14: Uncovering security hubris with Adam Kujawa
Mihari – A Helper To Run OSINT Queries & Manage Results Continuously
KitPloit - PenTest Tools!-- Mihari is a helper to run queries & manage results continuously. Mihari can be used for C2, landing page and phishing hunting.How it worksMihari makes a query against Shodan, Censys, VirusTotal, SecurityTrails, etc. and extracts artifacts (IP addresses, domains, URLs and hashes) from the results.Mihari checks whether a DB (SQLite3 or … Continue reading Mihari – A Helper To Run OSINT Queries & Manage Results Continuously
SourceWolf – Amazingly Fast Response Crawler To Find Juicy Stuff In The Source Code!
KitPloit - PenTest Tools!-- Tested environments: Windows, MAC, linux, and windows subsystem for linux (WSL) What can SourceWolf do? Crawl through responses to find hidden endpoints, either by sending requests, or from the local response files (if any). Create a list of javascript variables found in the source Extract all the social media links from … Continue reading SourceWolf – Amazingly Fast Response Crawler To Find Juicy Stuff In The Source Code!
Iblessing – An iOS Security Exploiting Toolkit, It Mainly Includes Application Information Collection, Static Analysis And Dynamic Analysis
KitPloit - PenTest Tools!-- iblessingiblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis.iblessing is based on unicorn engine and capstone engine.FeaturesCross-platform: Tested on macOS and Ubuntu. iOS App static info extract, including metadata, deeplinks, urls, etc. Mach-O parser and dyld symbol bind simulator Objective-C class realizing … Continue reading Iblessing – An iOS Security Exploiting Toolkit, It Mainly Includes Application Information Collection, Static Analysis And Dynamic Analysis





