Malware-distributing spam campaigns are targeting people in France
FireEye Identifies Prolific Chinese Cyber-Threat Group
APT41 has targeted various industries across multiple jurisdictions.
Researchers Reveal 35 Flaws in Six Printers
Sysadmins urged to patch after latest discovery
CafePress Slammed After Major Breach Affecting 23 Million
Exposed data included unique email addresses and passwords
#BHUSA: Phishing Attacks Categorized as Extreme, Boutique and Bulk
Reclassifying phishing attacks, and the ways to help users spot them
North Korean Hackers Amass $2bn Via Cyber-Attacks
Raids on cryptocurrency exchanges help Pyongyang’s WMD program, says UN
#BHUSA : Open Source is Key to Solving Cyber Skills Gap
At Black Hat USA in Las Vegas, Anomali threat research team manager Joakim Kennedy explained to Eleanor Dallaway why he believes the open source movement in the cybersecurity industry will help to address the skills gap in the industry
Slurp- To Security Audits of S3 Buckets Enumerator
Slurp- Blackbox/Whitebox S3 Bucket Enumerator
To Evaluate the security of S3 buckets
Overview
Credit to all the vendor packages to develop Slurp possible.
Slurp is for pen-testers and security professionals to perform audits of s3 bucke…
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get flagged by endpoint protection.
During an engageme…
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams.
With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.
PhanTap is silent in the network an…