Raids on cryptocurrency exchanges help Pyongyang’s WMD program, says UN
#BHUSA : Open Source is Key to Solving Cyber Skills Gap
At Black Hat USA in Las Vegas, Anomali threat research team manager Joakim Kennedy explained to Eleanor Dallaway why he believes the open source movement in the cybersecurity industry will help to address the skills gap in the industry
Slurp- To Security Audits of S3 Buckets Enumerator
Slurp- Blackbox/Whitebox S3 Bucket Enumerator
To Evaluate the security of S3 buckets
Overview
Credit to all the vendor packages to develop Slurp possible.
Slurp is for pen-testers and security professionals to perform audits of s3 bucke…
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub- A Post Exploitation Suite To Bypass Endpoint Protection
PowerHub is a convenient post exploitation tool which aids a pentester in transferring files, in particular code which may get flagged by endpoint protection.
During an engageme…
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams.
With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.
PhanTap is silent in the network an…
#BHUSA: Keynote Encourages Positivity and Collaboration
The Black Hat USA keynote encourages better collaboration and a more positive culture
LokiBot Gets Sneakier With Steganography
LokiBot is getting stealthier and is now hiding its devastating payload in image files.
IBM’s Warshipping Attacks Wi-Fi Networks From Afar
Forget wardriving; warshipping is a more targeted way to hit a company’s wireless network, says IBM.
Children’s Tablet Revealed Location, Researchers Found
LeapFrog’s Pet Chat app was leaking children’s location, say researchers.
#BHUSA: Need For Technologists to Be Recognized and Empowered
Why the world needs to empower technologists