GitHub

Emerging Threat: Understanding the PySilon Discord RAT’s Versatile Features

Emerging Threat: Understanding the PySilon Discord RAT’s Versatile Features 18/09/2023 at 18:09 By cybleinc Cyble Research and Intelligence Labs analyzes the Emerging PySilon Discord RAT and Explores its Versatile functionalities. The post Emerging Threat: Understanding the PySilon Discord RAT’s Versatile Features appeared first on Cyble. This article is an excerpt from Cyble View Original Source […]

React to this headline:

Loading spinner

Emerging Threat: Understanding the PySilon Discord RAT’s Versatile Features Read More »

Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers

Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers 12/09/2023 at 06:02 By Help Net Security Bruschetta-Board is a device for all hardware hackers looking for a fairly-priced all-in-one debugger and programmer that supports UART, JTAG, I2C & SPI protocols and allows to interact with different targets’ voltages (i.e., 1.8, 2.5, 3.3 and 5 Volts!). A

React to this headline:

Loading spinner

Bruschetta-Board: Multi-protocol Swiss Army knife for hardware hackers Read More »

MITRE Caldera for OT now available as extension to open-source platform

MITRE Caldera for OT now available as extension to open-source platform 06/09/2023 at 09:32 By Help Net Security MITRE Caldera for OT is now publicly available as an extension to the open-source Caldera platform, allowing security teams to run automated adversary emulation exercises that are specifically focused on threats to operational technology (OT). The first

React to this headline:

Loading spinner

MITRE Caldera for OT now available as extension to open-source platform Read More »

Reaper: Open-source reconnaissance and attack proxy workflow automation

Reaper: Open-source reconnaissance and attack proxy workflow automation 05/09/2023 at 06:01 By Mirko Zorz Reaper is an open-source reconnaissance and attack proxy, built to be a modern, lightweight, and efficient equivalent to Burp Suite/ZAP. It focuses on automation, collaboration, and building universally distributable workflows. Reaper is a work in progress, but it’s already capable of

React to this headline:

Loading spinner

Reaper: Open-source reconnaissance and attack proxy workflow automation Read More »

GitHub Enterprise Server Gets New Security Capabilities

GitHub Enterprise Server Gets New Security Capabilities 30/08/2023 at 15:31 By Ionut Arghire GitHub Enterprise Server 3.10 released with additional security capabilities, including support for custom deployment rules. The post GitHub Enterprise Server Gets New Security Capabilities appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

GitHub Enterprise Server Gets New Security Capabilities Read More »

Velociraptor: Open-source digital forensics and incident response

Velociraptor: Open-source digital forensics and incident response 30/08/2023 at 06:32 By Help Net Security Velociraptor is a sophisticated digital forensics and incident response tool designed to improve your insight into endpoint activities. Velociraptor enables you to conduct precise and rapid collection of digital forensic data across multiple endpoints simultaneously. Persistently gather events from endpoints, including

React to this headline:

Loading spinner

Velociraptor: Open-source digital forensics and incident response Read More »

8 open-source OSINT tools you should try

8 open-source OSINT tools you should try 22/08/2023 at 06:01 By Help Net Security Open-Source Intelligence (OSINT) refers to gathering, assessing, and interpreting public information to address specific intelligence queries. All the tools listed here are available for free. Amass The OWASP Amass project performs network mapping of attack surfaces and external asset discovery using

React to this headline:

Loading spinner

8 open-source OSINT tools you should try Read More »

Findlargedir: Find all “blackhole” directories with a huge amount of filesystem entries

Findlargedir: Find all “blackhole” directories with a huge amount of filesystem entries 17/08/2023 at 06:04 By Help Net Security Findlargedir is a tool written to help quickly identify “black hole” directories on any filesystem having more than 100k entries in a single flat structure. When a directory has many entries (directories or files), getting a

React to this headline:

Loading spinner

Findlargedir: Find all “blackhole” directories with a huge amount of filesystem entries Read More »

Assess multi-cloud security with the open-source CNAPPgoat project

Assess multi-cloud security with the open-source CNAPPgoat project 03/08/2023 at 07:31 By Help Net Security Ermetic released CNAPPgoat, an open-source project that allows organizations to test their cloud security skills, processes, tools, and posture in interactive sandbox environments that are easy to deploy and destroy. It is available on GitHub. CNAPPgoat supports AWS, Azure (Microsoft

React to this headline:

Loading spinner

Assess multi-cloud security with the open-source CNAPPgoat project Read More »

Open-source penetration testing tool BloodHound CE released

Open-source penetration testing tool BloodHound CE released 02/08/2023 at 06:32 By Mirko Zorz SpecterOps released version 5.0 of BloodHound Community Edition (CE), a free and open-source penetration testing solution that maps attack paths in Microsoft Active Directory (AD) and Azure (including Azure AD/Entra ID) environments. It is available for free on GitHub. Identifying simple Attack

React to this headline:

Loading spinner

Open-source penetration testing tool BloodHound CE released Read More »

UAC: Live response collection script for incident response

UAC: Live response collection script for incident response 27/07/2023 at 05:33 By Help Net Security Unix-like Artifacts Collector (UAC) is a live response collection script for incident response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD, and Solaris systems artifacts. It

React to this headline:

Loading spinner

UAC: Live response collection script for incident response Read More »

Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer

Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer 21/07/2023 at 19:19 By cybleinc Cyble Research and Intelligence Labs analyzes Threat Actors spreading Luca Stealer disguised as a beta version of Microsoft Crypto Wallet. The post Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer appeared first on Cyble. This article is an excerpt from Cyble View

React to this headline:

Loading spinner

Fabricated Microsoft Crypto Wallet Phishing Site Spreads Infostealer Read More »

North Korean hackers targeted tech companies through JumpCloud and GitHub

North Korean hackers targeted tech companies through JumpCloud and GitHub 21/07/2023 at 16:03 By Helga Labus North Korean state-sponsored hackers have been linked to two recent cyberattack campaigns: one involving a spear-phishing attack on JumpCloud and the other targeting tech employees on GitHub through a social engineering campaign. The JumpCloud intrusion On June 27, JumpCloud

React to this headline:

Loading spinner

North Korean hackers targeted tech companies through JumpCloud and GitHub Read More »

12 open-source penetration testing tools you might not know about

12 open-source penetration testing tools you might not know about 18/07/2023 at 07:34 By Mirko Zorz Red Siege has developed and made available many open-source tools to help with your penetration testing work. The company plans to continue to support the tools listed below, whether in the form of bug fixes or new features. Give

React to this headline:

Loading spinner

12 open-source penetration testing tools you might not know about Read More »

Legion Stealer targeting PUBG players

Legion Stealer targeting PUBG players 11/07/2023 at 12:09 By cybleinc CRIL analyzes how a fake PUBG Bypass Hack GitHub Repository serves as a gateway for Legion Stealer malware distribution. The post Legion Stealer targeting PUBG players appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

Legion Stealer targeting PUBG players Read More »

Popular generative AI projects pose serious security threat

Popular generative AI projects pose serious security threat 29/06/2023 at 07:48 By Help Net Security Many popular generative AI projects are an increased security threat and open-source projects that utilize insecure generative AI and LLMs also have poor security posture, resulting in an environment with substantial risk for organizations, according to Rezilion. Advancements in LLMs

React to this headline:

Loading spinner

Popular generative AI projects pose serious security threat Read More »

Trojanized Super Mario Game Installer Spreads SupremeBot Malware

Trojanized Super Mario Game Installer Spreads SupremeBot Malware 23/06/2023 at 15:24 By cybleinc Cyble analyzes SupremeBot, a crypto-mining client leveraging a trojanized Super Mario game installer to spread Umbral stealer malware. The post Trojanized Super Mario Game Installer Spreads SupremeBot Malware appeared first on Cyble. This article is an excerpt from Cyble View Original Source

React to this headline:

Loading spinner

Trojanized Super Mario Game Installer Spreads SupremeBot Malware Read More »

Fiddler Auditor: Open-source tool evaluates the robustness of large language models

Fiddler Auditor: Open-source tool evaluates the robustness of large language models 15/06/2023 at 07:17 By Help Net Security Fiddler Auditor is an open-source tool designed to evaluate the robustness of Large Language Models (LLMs) and Natural Language Processing (NLP) models. LLMs can sometimes produce unwarranted content, potentially create hostile responses, and may disclose confidential information

React to this headline:

Loading spinner

Fiddler Auditor: Open-source tool evaluates the robustness of large language models Read More »

Threat Actor Targets Russian Gaming Community With WannaCry-Imitator

Threat Actor Targets Russian Gaming Community With WannaCry-Imitator 13/06/2023 at 19:21 By cybleinc CRIL analyzes WannaCry-Imitator Ransomware, a phishing gaming site targeting the Russian Gaming community The post Threat Actor Targets Russian Gaming Community With WannaCry-Imitator appeared first on Cyble. This article is an excerpt from Cyble View Original Source React to this headline:

React to this headline:

Loading spinner

Threat Actor Targets Russian Gaming Community With WannaCry-Imitator Read More »

Over 45 thousand Users Fell Victim to Malicious PyPI Packages

Over 45 thousand Users Fell Victim to Malicious PyPI Packages 09/06/2023 at 12:31 By cybleinc Through the analysis of more than 160 malicious Python packages, CRIL reveals insights into the threat landscape associated with Python packages. The post Over 45 thousand Users Fell Victim to Malicious PyPI Packages appeared first on Cyble. This article is

React to this headline:

Loading spinner

Over 45 thousand Users Fell Victim to Malicious PyPI Packages Read More »

Scroll to Top