Blog

2 for 1 Phishing Attack Targets Google and Facebook Users via Google Translate

This is not your run-of-the-mill phishing attack targeting login credentials from a single online brand. This greedy, two-stage scheme casts one net to rope in both Google and Facebook login credentia...

Eraser – Secure Hard Drive Wiper for Windows

Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is cu...

BDFProxy – Patch Binaries via MiTM

BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads (software updates for example) from vendors that don’t...

773M Credentials Dumped on the Dark Web

Thousands of individual breaches make up the database, one of the largest troves of stolen credentials ever seen. A database of breached emails totaling 773 million unique addresses has turned up on a...

Fortnite Hacked Via Insecure Single Sign-On Leaky Fortnite single sign-on mechanism could have allowed hackers to access game accounts. Epic Games patched a bug that could have allowed hackers to brea...

Data Exposed in OXO, Amazon and MongoDB Leaks

Dual data exposures and a wide-scale data leak due to a vulnerable MongoDB database have kicked off 2019 so far. 2019 has so far been making good on security experts’ predictions that there will be no...

NSA to release its GHIDRA reverse engineering tool for free

The United States’ National Security Agency (NSA) is planning to release its internally developed reverse engineering tool for free at the upcoming RSA security conference 2019 that will be held...

Zerodium Offers to Buy Zero-Day Exploits at Higher Prices Than Ever

Well, there’s some good news for hackers and vulnerability hunters, though terrible news for tech manufacturers! Exploit vendor Zerodium is now willing to offer significantly higher payouts for ...

PyLocky Ransomware Decryption Tool Released — Unlock Files For Free

If your computer has been infected with PyLocky Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt your files—your search might end here. Security researcher&n...

Ryuk Ransomware Suspected in U.S. Newspaper Attack

The recent cyberattack that disrupted the delivery of several major newspapers in the United States may have involved Ryuk, a piece of ransomware that has typically been used in targeted ope...

  • 1
  • 2