Hackers scanned for vulnerable organizations
iKy OSINT Project – To Collect Information From E-Mail With GUI
iky OSINT Project. Collect information from a mail. Gather, Profile, Timeline.
Project iKy is to collects information from an email and shows results in a nice visual interface.
Installation
Clone repository
git clone https://gitlab.com/kenn…
Russian FSB Contractor Breach Reveals 7.5TB of Data
Major compromise lifts lid on secretive Kremlin projects
In Conversation: It’s Never Too Late
There can be barriers to pursuing a career in tech. For many people, the journey isn’t straightforward. Many of our Akamai employees have diverse backgrounds and have overcome obstacles to pursue their dream career. Often, the way forward into a…
Slack Resets 1% of Passwords After 2015 Data Breach
New information prompts Slack to change passwords on user accounts.
FinServ Fears Cert-Related Outages Will Hurt Brand
One-third of financial CIOs report suffering an outage in the past six months.
New Malware Frame Cashing in on Ad Fraud
Malware framework is reportedly responsible for 1 billion fraudulent Google AdSense ad impressions.
Magecart Group Spotted Operating From War Zone
Luhansk-based server supports attacks on hundreds of e-com sites
RedGhost – Linux Post Exploitation Framework
RedGhost- Linux post exploitation framework
It has designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
Payloads
Function to generate various encoded reverse shells in netcat, bash…
Microsoft Alerts 10,000 Customers of Nation State Attacks
Redmond warns that 95% of attacks on political orgs are in US