Coronavirus “safety measures” email is a phishing scam – Link to post -- NakedSecurity
PayPal SMS scams – don’t fall for them! – Link to post -- NakedSecurity
Someone else may have your videos, Google tells users – Link to post -- NakedSecurity
Facebook will let parents see kids’ chat history, peer into inbox – Link to post -- NakedSecurity
Critical Android flaws patched in February bulletin – Link to post -- NakedSecurity
Twitter admits to raid on users’ phone numbers – Link to post -- NakedSecurity
NIST tests methods of recovering data from smashed smartphones – Link to post -- NakedSecurity
Twitter hands over student’s account to his college – Link to post -- NakedSecurity
Google’s Super Bowl ad will make you cry. Or wince. – Link to post -- NakedSecurity
Apple proposes simple security upgrade for SMS 2FA codes – Link to post -- NakedSecurity
FTC warns VoIP providers that help robocallers: we can and will sue – Link to post -- NakedSecurity
Google launches open-source security key project, OpenSK – Link to post -- NakedSecurity
Serious Security – How ‘special case’ code blew a hole in OpenSMTPD – Link to post -- NakedSecurity
UN hacked via unpatched SharePoint server – Link to post -- NakedSecurity
Facebook to pay $550m to settle face-tagging suit – Link to post -- NakedSecurity
Critical Cisco ‘CDPwn’ Flaws Affect Millions of Devices Link to post -- ThreatPost
Gamaredon APT Improves Toolset to Target Ukraine Government, Military Link to post -- ThreatPost
Two Critical Android Bugs Get Patched in February Update Link to post -- ThreatPost
Community Housing Nonprofit Hit with $1.2M Loss in BEC Scam Link to post -- ThreatPost
New Lemon Duck Malware Campaign Targets IoT, Large Manufacturers Link to post -- ThreatPost
WhatsApp Bug Allows Malicious Code-Injection, One-Click RCE Link to post -- ThreatPost
Critical Cisco 'CDPwn' Protocol Flaws Explained: Podcast Link to post -- ThreatPost
Ransomware Attack Hinders Toll Group Operations Link to post -- ThreatPost
Medtronic Patches Implanted Device, CareLink Programmer Bugs Link to post -- ThreatPost
Microsoft Offers Rewards of Up to $20,000 in New Xbox Bug Bounty Program Link to post -- ThreatPost
TrickBot Switches to a New Windows 10 UAC Bypass to Evade Detection Link to post -- ThreatPost
U.N. Hack Stemmed From Microsoft SharePoint Flaw Link to post -- ThreatPost
Sodinokibi Ransomware Group Sponsors Hacking Contest Link to post -- ThreatPost
Google Discloses Android Camera Hijack Hack Link to post -- ThreatPost
No 'Silver Bullet' Fix for Alexa, Google Smart Speaker Hacks Link to post -- ThreatPost
Marc Rogers: Success of Anonymous Bug Submission Program 'Takes A Village' Link to post -- ThreatPost
Thousands of IoT Devices Bricked By Silex Malware Link to post -- ThreatPost
Newsmaker Interview: Bruce Schneier on Physical Cyber Threats Link to post -- ThreatPost
ThreatList: Ransomware Costs Double in Q4, Sodinokibi Dominates Link to post -- ThreatPost
ThreatList: 90% SMBs Believe Nation-State Actors Are Targeting Them Link to post -- ThreatPost
ThreatList: A Third of Biometric Systems Targeted by Malware in Q3 Link to post -- ThreatPost
ThreatList: Admin Rights for Third Parties is the Norm Link to post -- ThreatPost
ThreatList: Most Retail Hardware Bug Bounty Flaws Are Critical Link to post -- ThreatPost
Bezos, WhatsApp Cyberattacks Show Growing Mobile Sophistication Link to post -- ThreatPost
Vivin Nets Thousands of Dollars Using Cryptomining Malware Link to post -- ThreatPost
News Wrap: PoC Exploits, Cable Haunt and Joker Malware Link to post -- ThreatPost
Podcast: NSA Reports Major Crypto-Spoofing Bug to Microsoft Link to post -- ThreatPost
California's Tough New Privacy Law and Its Biggest Challenges Link to post -- ThreatPost
Podcast: The Roadblocks and Opportunities For Women in Cybersecurity Link to post -- ThreatPost
Podcast: What We've Learned from the Year of the Breach Link to post -- ThreatPost
Top Zero Days, Data Breaches and Security Stories of 2019: News Wrap Link to post -- ThreatPost
Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats Link to post -- ThreatPost
‘Wildly Different’ Privacy Regulations Causing Compliance Chaos Link to post -- ThreatPost
California's Domino Effect on U.S. Privacy Regulation Link to post -- ThreatPost
Post GandCrab, Cybercriminals Scouring the Dark Web for the Next Top Ransomware Link to post -- ThreatPost
Election Security Threats: From Misinformation to Voting Machine Link to post -- ThreatPost
Security Vulnerabilities Are Increasingly Putting Kids at Risk Link to post -- ThreatPost
Data Security in the Cloud: How to Lock Down the Next-Gen Perimeter Link to post -- ThreatPost
Hackers Take Over IoT Devices to 'Click' on Ads Link to post -- ThreatPost
Lax Telco Security Allows Mobile Phone Hijacking and Redirects Link to post -- ThreatPost
2020 Cybersecurity Trends to Watch Link to post -- ThreatPost
Top Mobile Security Stories of 2019 Link to post -- ThreatPost
Facebook Security Debacles: 2019 Year in Review Link to post -- ThreatPost
Biggest Malware Threats of 2019 Link to post -- ThreatPost
Top 10 IoT Disasters of 2019 Link to post -- ThreatPost
2019 Malware Trends to Watch Link to post -- ThreatPost
Top 2018 Security and Privacy Stories Link to post -- ThreatPost
2019: The Year Ahead in Cybersecurity Link to post -- ThreatPost
2018: A Banner Year for Breaches Link to post -- ThreatPost
Keeping Compliance Data-Centric Amid Accelerating ... Link to post -- DarkReading
Hiring Untapped Security Talent Can Transform the ... Link to post -- DarkReading
Companies Pursue Zero Trust, but Implementers Are ... Link to post -- DarkReading
8 of the 10 Most Exploited Bugs Last Year Involved ... Link to post -- DarkReading
SharePoint Bug Proves Popular Weapon for ... Link to post -- DarkReading
Microsoft DART Finds Web Shell Threat on the Rise Link to post -- DarkReading
Ransomware Attacks: Why It Should Be Illegal to Pay ... Link to post -- DarkReading
7 Ways SMBs Can Secure Their Websites Link to post -- DarkReading
Twitter Suspends Fake Accounts Abusing Feature that ... Link to post -- DarkReading
Kubernetes Shows Built-in Weakness Link to post -- DarkReading
What WON'T Happen in Cybersecurity in 2020 Link to post -- DarkReading
Bad Certificate Knocks Teams Offline Link to post -- DarkReading
EKANS Ransomware Raises Industrial-Control Worries Link to post -- DarkReading
C-Level & Studying for the CISSP Link to post -- DarkReading
Researchers Find 24 'Dangerous' Android Apps with ... Link to post -- DarkReading
Attackers Actively Targeting Flaw in Door-Access ... Link to post -- DarkReading
Coronavirus Phishing Attack Infects US, UK Inboxes Link to post -- DarkReading
How Device-Aware 2FA Can Defeat Social Engineering ... Link to post -- DarkReading
What It's Like to Be a CISO: Check Point Security ... Link to post -- DarkReading
'George' the Most Popular Password That's a Name Link to post -- DarkReading
Charming Kitten Hackers Impersonate Journalist in Phishing Attacks Link to post -- BleepingComputer
Chrome 80 Released With 56 Security Fixes, Cookie Changes, More Link to post -- BleepingComputer
Bitbucket Abused to Infect 500,000+ Hosts with Malware Cocktail Link to post -- BleepingComputer
Emotet Gets Ready for Tax Season With Malicious W-9 Forms Link to post -- BleepingComputer
Cisco Patches Critical CDP Flaws Affecting Millions of Devices Link to post -- BleepingComputer
Microsoft Starts Testing Hyper-V for Windows 10 ARM64 Devices Link to post -- BleepingComputer
New Ransomware Strain Halts Toll Group Deliveries Link to post -- BleepingComputer
Windows 10 Search Is Broken and Shows Blank Results, How to Fix Link to post -- BleepingComputer
Realtek Fixes DLL Hijacking Flaw in HD Audio Driver for Windows Link to post -- BleepingComputer
FBI Warns of DDoS Attack on State Voter Registration Site Link to post -- BleepingComputer
WhatsApp Bug Allowed Attackers to Access the Local File System Link to post -- BleepingComputer
Google Bug Sent Private Google Photos Videos to Other Users Link to post -- BleepingComputer
Office 365 to Block Harmful Content Regardless of Custom Configs Link to post -- BleepingComputer
New EmoCheck Tool Checks if You're Infected With Emotet Link to post -- BleepingComputer
Twitter Fixed Issue Exploited to Match Phone Numbers to Accounts Link to post -- BleepingComputer
Nintendo Hacker Pleads Guilty to Child Porn Charges, Faces 25 Years Link to post -- BleepingComputer
Bouygues Construction Shuts Down Network to Thwart Maze Ransomware Link to post -- BleepingComputer
DoD to Require Cybersecurity Certification From Defense Contractors Link to post -- BleepingComputer
DoppelPaymer Ransomware Sells Victims' Data on Darknet if Not Paid Link to post -- BleepingComputer
'Hack' Creates Fake Google Maps Traffic Jams With 99 Cell Phones Link to post -- BleepingComputer
FBI Issues Valentine Romance Scam Warning Link to post -- InfoSec-Magazine
LexisNexis Risk Solutions to Acquire Emailage Link to post -- InfoSec-Magazine
YouTube Issues Deepfake Ban Reminder Link to post -- InfoSec-Magazine
Nine Steps to Cybersecurity Link to post -- InfoSec-Magazine
Let’s Not Wait for Crises Before Prioritizing Safeguards for AI Link to post -- InfoSec-Magazine
Coronavirus Phishing Attacks Aim to Spread Malware Infection Link to post -- InfoSec-Magazine
More Than 80% of UK Firms Don’t Have Specialist Cyber Insurance Link to post -- InfoSec-Magazine
EKANS Ransomware Detected with ICS-Specific Functions Link to post -- InfoSec-Magazine
Making a SOAR Strategy Work For You Link to post -- InfoSec-Magazine
Leveraging ISO 27001 to Manage Cyber & Information Security Risks Link to post -- InfoSec-Magazine
New Year, New Decade, New Threats and Challenges Link to post -- InfoSec-Magazine
2019 Cybersecurity Headlines in Review Link to post -- InfoSec-Magazine
Authentication Standards in 2019: Why Passwords Remain Problematic, and Future Solutions Link to post -- InfoSec-Magazine
Fact & Fiction in Advanced Threat Detection Link to post -- InfoSec-Magazine
Clearing the Path to Software-Defined Segmentation Link to post -- InfoSec-Magazine
Zero Trust in Practice: Why Identity Drives Next-Gen Access Link to post -- InfoSec-Magazine
Make Privileged Access Admin Work and Block Lateral Movement by Attackers Link to post -- InfoSec-Magazine
How Segmentation Leads to Visibility and Enables Compliance Link to post -- InfoSec-Magazine
Are You At Risk? Know Your Cybersecurity Posture With Security Ratings Link to post -- InfoSec-Magazine
The Insider's Motive: Defending Against the 7 Most Common Insider Threats Link to post -- InfoSec-Magazine
Maze Ransomware Hits Law Firms and French Giant Bouygues Link to post -- InfoSec-Magazine
Police Warn of Physical IT Risk from Malicious Contractors Link to post -- InfoSec-Magazine
Zynga Breach Hit 173 Million Users Link to post -- InfoSec-Magazine
Cybersecurity Incident Mars Australian Freight Giant’s Operations Link to post -- InfoSec-Magazine
Missile Engineer Arrested After Taking Secret Info to China Link to post -- InfoSec-Magazine
Racine Mayor Refuses to Pay Cyber-Ransom Link to post -- InfoSec-Magazine
AI in Security: Keeping Up with the Trend Link to post -- InfoSec-Magazine
Strategies to Scale and Upskill Your Security Team Link to post -- InfoSec-Magazine
Automation in Data File Transfer: Improving Security and Saving You Time Link to post -- InfoSec-Magazine
Big Data, Big Risks Link to post -- InfoSec-Magazine
#BSidesLeeds: Cyber is Running the World, More Innovation to Come Link to post -- InfoSec-Magazine
Why the Travelex Incident Portends the Changing Nature of Ransomware Link to post -- InfoSec-Magazine
Alleged Human Trafficker Accused of Faking Social Media to Contact Victim Link to post -- InfoSec-Magazine
Democrats Deny Iowa Caucus App Hack Link to post -- InfoSec-Magazine
Twitter Fixes API Bug That Unmasked Users Link to post -- InfoSec-Magazine
Suffolk iCloud Voyeur Gets 32 Months Behind Bars Link to post -- InfoSec-Magazine
Nintendo Hacker Pleads Guilty to Downloading Child Porn Link to post -- InfoSec-Magazine
Malware attacks destroy Fondren Orthopedic Group patient records Link to post -- SCMagazine
Philips WiFi light bulb vulnerable to attack Link to post -- SCMagazine
Detecting malware patterns with cutting-edge graph search tools Link to post -- SCMagazine
Twitter goes after Baby Peanut, API threat Link to post -- SCMagazine
Cybersecurity executive changes Link to post -- SCMagazine
Red and blue teams have changed — Here’s how your security strategy can keep up Link to post -- SCMagazine
Confidential Computing: The confidentiality of data in business is at peak recognition Link to post -- SCMagazine
How a bill becomes a compliance ask Link to post -- SCMagazine
Report ties Ekans/Snake ransomware to Megacortex, stresses ICS threat Link to post -- SCMagazine
Critical flaw in OpenSMTPD found, patched Link to post -- SCMagazine
Maze ransomware publicly shaming victims into paying Link to post -- SCMagazine
Iowa Dems say reporting inconsistencies, not hack, caused delays in caucus results Link to post -- SCMagazine
TA505 phishing campaign uses HTML redirectors to spread info stealer Link to post -- SCMagazine
Ransomware knocks city of Racine offline Link to post -- SCMagazine
Flaws in WhatsApp’s desktop app allowed remote access to files Link to post -- PacketStorm
Tesla Autopilot Duped By 'Phantom' Images Link to post -- PacketStorm
Brazilian firm exposes personal details of thousands of soccer fans Link to post -- PacketStorm
Twitter goes after Baby Peanut, API threat Link to post -- PacketStorm
Clam AntiVirus Toolkit 0.102.2 Link to post -- PacketStorm
Ubuntu Security Notice USN-4269-1 Link to post -- PacketStorm
Ubuntu Security Notice USN-4268-1 Link to post -- PacketStorm
nfstream 3.1.2 Link to post -- PacketStorm
Red Hat Security Advisory 2020-0378-01 Link to post -- PacketStorm
Windscribe WindscribeService Named Pipe Privilege Escalation Link to post -- PacketStorm
Wago PFC200 Remote Code Execution Link to post -- PacketStorm
Ubuntu Security Notice USN-4263-2 Link to post -- PacketStorm
Socat 1.7.3.4 Heap Overflow Link to post -- PacketStorm
Red Hat Security Advisory 2020-0431-01 Link to post -- PacketStorm
Ubuntu Security Notice USN-4266-1 Link to post -- PacketStorm
Red Hat Security Advisory 2020-0375-01 Link to post -- PacketStorm
Kronos WebTA 4.0 Privilege Escalation / Cross Site Scripting Link to post -- PacketStorm
Verodin Director Web Console 3.5.4.0 Password Disclosure Link to post -- PacketStorm
Red Hat Security Advisory 2020-0374-01 Link to post -- PacketStorm
Ubuntu Security Notice USN-4265-2 Link to post -- PacketStorm
AVideo Platform 8.1 User Enumeration Link to post -- PacketStorm
Red Hat Security Advisory 2020-0366-01 Link to post -- PacketStorm
Red Hat Security Advisory 2020-0406-01 Link to post -- PacketStorm
AVideo Platform 8.1 Cross Site Request Forgery Link to post -- PacketStorm
xglance-bin Local Root Privilege Escalation Link to post -- PacketStorm
ISO-8385 Protocol Fuzzer Link to post -- PacketStorm
HiSilicon DVR/NVR hi3520d Firmware Backdoor Account Link to post -- PacketStorm
Ubuntu Security Notice USN-4265-1 Link to post -- PacketStorm
Ashley Madison Breach Extortion Scam Targets Hundreds Link to post -- PacketStorm
AZORult Campaign Adopts Novel Triple-Encryption Technique Link to post -- PacketStorm
Hacker pleads guilty to stealing Nintendo secrets Link to post -- PacketStorm
New ransomware doesn’t just encrypt data. It also meddles with critical infrastructure Link to post -- PacketStorm
Charges dropped against Coalfire security team who broke into courthouse during pen test Link to post -- PacketStorm
The CIA’s Infamous, Unsolved Kryptos Cryptographic Puzzle Gets a ‘Final Clue’ - VICE Link to post -- PacketStorm
TrickBot Switches to a New Windows 10 UAC Bypass to Evade Detection Link to post -- PacketStorm
Trump congratulates state of Kansas after Chiefs win Super Bowl but they play in Missouri - CNNPolitics Link to post -- PacketStorm
Huduma Namba: Kenya court halts biometric ID over data fears Link to post -- PacketStorm
Jeff Bezos met FBI investigators in 2019 over alleged Saudi hack | Technology Link to post -- PacketStorm
How to Get Into Bug Bounties - The Startup Link to post -- Medium
How to Protect Yourself from Unscrupulous Fraudsters Link to post -- Medium
CVE-2020-1925: Requests to arbitrary URLs in Apache Olingo Link to post -- Medium
Don’t Make This Common Salary Negotiation Mistake. It Can Easily Backfire Link to post -- Medium
When Raising a Round, Not All Capital is Equal - Inc Magazine Link to post -- Medium
How the Japanese Word ‘Ikigai’ Can Help Your Business Be More Successful Link to post -- Medium
Personal cybersecurity posture for when you’re just this guy, you know? Link to post -- Medium
Indexing Network Traffic with Moloch and Elastic - The Startup Link to post -- Medium
Building a UDP Scanner in Python - Software for the Utopian Link to post -- Medium
Past the Internet: The Emergence of the Modnet - Rachel Aliana Link to post -- Medium
A Look at Chrome's Security: Understanding V8 | Software for the Utopian Link to post -- Medium
Open-Sourcing riskquant, a library for quantifying risk Link to post -- Medium
Security Questions Are a Terrible, Horrible, Bad Idea Link to post -- Medium
How I built Heimdall, an open-source personal email guardian. Link to post -- Medium
The Bug That Exposed Your PayPal Password - Alex Birsan Link to post -- Medium
Why you should switch to Signal or Telegram from WhatsApp, Today Link to post -- Medium
I Opened My Connection To SSH Attacks, And These Were The Requests I Saw Link to post -- Medium
UK: Data leak exposes 17,000 yachting industry professionals Link to post
Salesforce Data Breach Suit Cites California Privacy Law Link to post
Golden Entertainment addresses data breach Link to post
Data Forensics Expert Witness: Facebook Exposes Personal Data! – Digitalmunition Link to post
Iranian-Backed APT34 Tries to Compromise Company Linked to U.S. Government – HOTforSecurity Link to post
AppSec Lessons Learned In 2019 | Information Security Buzz Link to post
Weather.com Has Become the Pawn of A Huge Data Theft Scheme Link to post -- Medium
Weekly Threat Briefing: Government Spyware Company Spied On Hundreds Of Innocent People Link to post
Warzone RAT Service Getting Popular Among Cybercriminals Link to post
DoppelPaymer Ransomware Gang Threatens to Dump Victims' Data Link to post
8 of the 10 Most Exploited Bugs Last Year Involved Microsoft Products – STE WILLIAMS Link to post
Twitter Suspends Fake Accounts for Exploiting API Vulnerability | SecurityWeek.Com Link to post
Come on, NSA, it’s time to join the fight against Windows hacking | Computerworld Link to post
These are the top ten software flaws used by crooks: Make sure you've applied the patches Link to post
Hackers Pose Increasing Risk to Medical Research Data Link to post
Protect Yourself From Cyberwarfare & Rootkit Threats – Digitalmunition Link to post
Analyzing WhatsApp Calls with Wireshark, radare2 and Frida Link to post
This is not Huawei to reassure people about Beijing's spying eyes: Trivial backdoor found in HiSilicon's firmware for net-connected cams, recorders • The Register Link to post
Anonymous creates pro-Taiwan page inside UN w... | Taiwan News Link to post
Reversing WannaCry Part 2 - Diving into the malware with #Ghidra - YouTube Link to post
Adding a Backdoor to AD in 400 Milliseconds Link to post
New Research on the Adtech Industry - Schneier on Security Link to post
Indian airline breach impacts 1.2m passengers | Information Age | ACS Link to post
SVG animate XSS vector | PortSwigger Research Link to post
Electrospaces.net: Review of Snowden's book Permanent Record - Part I: At the CIA Link to post
Wacom drawing tablets track the name of every application that you open | Robert Heaton Link to post
Researcher: Backdoor mechanism still active in devices using HiSilicon chips | ZDNet Link to post
Revisiting ReDoS: A Rough Idea of Data Exfiltration by ReDoS and Side-channel Techniques - Speaker Deck Link to post
Google, Tinder under investigation in Ireland over data processing | New Europe Link to post
GitHub - llamasoft/polyshell: A Bash/Batch/PowerShell polyglot! Link to post
Bouygues Construction Shuts Down Network to Thwart Maze Ransomware Link to post
Best Hacking Tools of 2019 – The Chinese Annual Hit List – Cyber Threat Insider Blog Link to post
Serious flaw that lurked in sudo for 9 years hands over root privileges | Ars Technica Link to post
@Th3G3nt3lman Shares His Recon Methodology and How He Consistently Collects $15,000 Bounties! - YouTube Link to post
CDPwn: 5 Zero-Days in Cisco Discovery Protocol | Armis Link to post
Researcher detects multiple security flaws in WhatsApp; helps Facebook to patch Link to post
Package 📦 Day via #PennFoster Online Locksmithing Course (334) - YouTube Link to post
Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting - SentinelLabs Link to post
The Dark Side of Smart Lighting: Check Point Research Shows How Business and Home Networks Can Be Hacked from a Lightbulb - Check Point Software Link to post
Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Cybercriminals Read From The File System Access Link to post
VPNs will change forever with the arrival of WireGuard into Linux | ZDNet Link to post
Schlage Primus Everest Picked and Gutted!!! - YouTube Link to post
Reversing WannaCry Part 2 - Diving into the malware with #Ghidra - YouTube Link to post
CVE-2019-12180 – ReadyAPI & SoapUI command execution via malicous project file | @Mediaservice.net Technical Blog Link to post
MITRE ATT&CK;™ EVALUATIONS Link to post
GitHub - mikewest/securer-contexts: Secure Contexts, but with _more_ secureness! Link to post
Exclusive: Iran-linked hackers pose as journalists in email scam - Reuters Link to post
Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Cybercriminals Read From The File System Access Link to post
Researcher: Backdoor mechanism still active in devices using HiSilicon chips | ZDNet Link to post
[82] Wilson Bohannon LOTO Lock Unboxed and Picked #lotolocktuesday #tagouttuesday - YouTube Link to post
CDPwn: 5 Zero-Days in Cisco Discovery Protocol | Armis Link to post
[20] Medeco 5 Pin Cam Lock Picked - YouTube Link to post
Ghost in the shell: Investigating web shell attacks - Microsoft Security Link to post
----Vulners.com High Sev. Last Day----
CVSS: 7.5 Security update for ImageMagick (moderate) Link to vuln / exploit
CVSS: 6.8 JVN#52486659: Ghostscript access restriction bypass vulnerability Link to vuln / exploit
CVSS: 7.5 ARM mbed TLS vulnerabilities Link to vuln / exploit
CVSS: 10.0 OpenSMTPD vulnerability Link to vuln / exploit
CVSS: 7.8 (RHSA-2020:0406) Important: containernetworking-plugins security update Link to vuln / exploit
CVSS: 10.0 (RHSA-2020:0375) Important: kernel-rt security and bug fix update Link to vuln / exploit
CVSS: 6.5 (RHSA-2020:0366) Important: qemu-kvm security, bug fix, and enhancement update Link to vuln / exploit
CVSS: 10.0 WAFs don't work Link to vuln / exploit
CVSS: 10.0 High severity vulnerability that affects org.apache.olingo:odata-client-proxy Link to vuln / exploit
CVSS: 7.8 Linux kernel vulnerability CVE-2019-19075 Link to vuln / exploit
CVSS: 9.0 (RHSA-2020:0388) Important: sudo security update Link to vuln / exploit
CVSS: 10.0 (RHSA-2020:0339) Important: kernel security and bug fix update Link to vuln / exploit
CVSS: 7.5 Ghost in the shell: Investigating web shell attacks Link to vuln / exploit
CVSS: 7.5 (RHSA-2020:0348) Important: container-tools:rhel8 security, bug fix, and enhancement update Link to vuln / exploit
CVSS: 6.8 Security update for upx (moderate) Link to vuln / exploit
CVSS: 7.5 Security update for python-reportlab (important) Link to vuln / exploit
CVSS: 6.8 Security update for ucl (moderate) Link to vuln / exploit
CVSS: 6.8 CVE-2013-7051 Link to vuln / exploit
CVSS: 6.8 CVE-2013-7053 Link to vuln / exploit
CVSS: 10.0 (RHSA-2020:0328) Important: kernel-rt security and bug fix update Link to vuln / exploit
CVSS: 7.2 Security update for mailman (moderate) Link to vuln / exploit
CVSS: 7.5 (RHSA-2020:0322) Critical: php:7.2 security update Link to vuln / exploit
CVSS: 7.8 Linux kernel vulnerability CVE-2019-19064 Link to vuln / exploit
CVSS: 7.8 Virtuozzo 7 : readykernel-patch (VZA-2019-050) Link to vuln / exploit
CVSS: 6.8 Virtuozzo 7 : readykernel-patch (VZA-2019-045) Link to vuln / exploit
CVSS: 7.5 Photon OS 1.0: Envoy PHSA-2020-1.0-0268 Link to vuln / exploit
CVSS: 6.8 Virtuozzo 7 : readykernel-patch (VZA-2019-042) Link to vuln / exploit
CVSS: 7.5 CentOS 6 : git (CESA-2020:0316) Link to vuln / exploit
CVSS: 7.5 RHEL 6 : git (RHSA-2020:0316) Link to vuln / exploit
CVSS: 7.5 SUSE SLES12 Security Update : python36 (SUSE-SU-2020:0302-1) Link to vuln / exploit
CVSS: 7.5 Jenkins < 2.214, < 2.204.2 LTS Authentication Bypass Vulnerability (Windows) Link to vuln / exploit
CVSS: 9.3 SMB DOUBLEPULSAR Remote Code Execution Exploit Link to vuln / exploit
CVSS: 7.5 Debian: Security Advisory for qemu (DSA-4616-1) Link to vuln / exploit
CVSS: 7.2 Virtuozzo 7 : readykernel-patch (VZA-2019-074) Link to vuln / exploit
CVSS: 7.2 Virtuozzo 7 : readykernel-patch (VZA-2019-086) Link to vuln / exploit
CVSS: 6.8 Virtuozzo 7 : readykernel-patch (VZA-2019-046) Link to vuln / exploit
CVSS: 7.5 Oracle Linux 6 : git (ELSA-2020-0316) Link to vuln / exploit
CVSS: 7.5 RHEL 8 : php:7.2 (RHSA-2020:0322) Link to vuln / exploit
CVSS: 7.5 Jenkins < 2.214, < 2.204.2 LTS Authentication Bypass Vulnerability (Linux) Link to vuln / exploit
CVSS: 9.3 SpamAssassin vulnerabilities Link to vuln / exploit
CVSS: 6.8 GraphicsMagick vulnerabilities Link to vuln / exploit
CVSS: 9.3 SpamAssassin vulnerabilities Link to vuln / exploit
CVSS: 7.8 Virtuozzo 7 : readykernel-patch (VZA-2019-068) Link to vuln / exploit
CVSS: 7.8 Virtuozzo 7 : readykernel-patch (VZA-2019-078) Link to vuln / exploit
CVSS: 6.9 Photon OS 3.0: Cpio PHSA-2020-3.0-0053 Link to vuln / exploit
CVSS: 9.3 Virtuozzo 7 : readykernel-patch (VZA-2019-008) Link to vuln / exploit
CVSS: 7.5 CentOS: Security Advisory for emacs-git (CESA-2020:0316) Link to vuln / exploit
----NVD Last 3 Days----
CVE#: CVE-2019-10784 Published Date: 2020-02-04 CVSS: NO CVSS
Description: phppgadmin through 7.12.1 allows sensitive actions to be performed without validating that the request originated from the application. One such area, "database.php" does not verify the source of an HTTP request. This can be leveraged by a remote attacker to trick a logged-in administrator to visit a malicious page with a CSRF exploit and execute arbitrary system commands on the server.
CVE#: CVE-2019-10786 Published Date: 2020-02-04 CVSS: NO CVSS
Description: network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument.
CVE#: CVE-2019-10787 Published Date: 2020-02-04 CVSS: NO CVSS
Description: im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization.
CVE#: CVE-2019-10788 Published Date: 2020-02-04 CVSS: NO CVSS
Description: im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
CVE#: CVE-2019-11251 Published Date: 2020-02-03 CVSS: NO CVSS
Description: The Kubernetes kubectl cp command in versions 1.1-1.12, and versions prior to 1.13.11, 1.14.7, and 1.15.4 allows a combination of two symlinks provided by tar output of a malicious container to place a file outside of the destination directory specified in the kubectl cp invocation. This could be used to allow an attacker to place a nefarious file using a symlink, outside of the destination tree.
CVE#: CVE-2019-11256 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11257 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11258 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11259 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11260 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11261 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11262 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11263 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11264 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11265 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11266 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-11267 Published Date: 2020-02-03 CVSS: NO CVSS
Description: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2019.
CVE#: CVE-2019-12528 Published Date: 2020-02-04 CVSS: NO CVSS
Description: An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.
CVE#: CVE-2019-15610 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Improper authorization in the Circles app 0.17.7 causes retaining access when an email address was removed from a circle.
CVE#: CVE-2019-15611 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Violation of Secure Design Principles in the iOS App 2.23.0 causes the app to leak its login and token to other Nextcloud services when search e.g. for federated users or registering for push notifications.
CVE#: CVE-2019-15612 Published Date: 2020-02-04 CVSS: NO CVSS
Description: A bug in Nextcloud Server 15.0.2 causes pending 2FA logins to not be correctly expired when the password of the user is reset.
CVE#: CVE-2019-15613 Published Date: 2020-02-04 CVSS: NO CVSS
Description: A bug in Nextcloud Server 17.0.1 causes the workflow rules to depend their behaviour on the file extension when checking file mimetypes.
CVE#: CVE-2019-15614 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Missing sanitization in the iOS App 2.24.4 causes an XSS when opening malicious HTML files.
CVE#: CVE-2019-15615 Published Date: 2020-02-04 CVSS: NO CVSS
Description: A wrong check for the system time in the Android App 3.9.0 causes a bypass of the lock protection when changing the time of the system to the past.
CVE#: CVE-2019-15616 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Dangling remote share attempts in Nextcloud 16 allow a DNS pollution when running long.
CVE#: CVE-2019-15617 Published Date: 2020-02-04 CVSS: NO CVSS
Description: A missing check in Nextcloud Server 17.0.0 allowed an attacker to set up a new second factor when trying to login.
CVE#: CVE-2019-15618 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Missing escaping of HTML in the Updater of Nextcloud 15.0.5 allowed a reflected XSS when starting the updater from a malicious location.
CVE#: CVE-2019-15619 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Improper neutralization of file names, conversation names and board names in Nextcloud Server 16.0.3, Nextcloud Talk 6.0.3 and Nextcloud Deck 0.6.5 causes an XSS when linking them with each others in a project.
CVE#: CVE-2019-15620 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Improper access control in Nextcloud Talk 6.0.3 leaks the existance and the name of private conversations when linked them to another shared item via the projects feature.
CVE#: CVE-2019-15621 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Improper permissions preservation in Nextcloud Server 16.0.1 causes sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link.
CVE#: CVE-2019-15622 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Not strictly enough sanitization in the Nextcloud Android app 3.6.0 allowed an attacker to get content information from protected tables when using custom queries.
CVE#: CVE-2019-15623 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Exposure of Private Information in Nextcloud Server 16.0.1 causes the server to send it's domain and user IDs to the Nextcloud Lookup Server without any further data when the Lookup server is disabled.
CVE#: CVE-2019-15624 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Improper Input Validation in Nextcloud Server 15.0.7 allows group admins to create users with IDs of system folders.
CVE#: CVE-2019-16893 Published Date: 2020-02-03 CVSS: NO CVSS
Description: The Web Management of TP-Link TP-SG105E V4 1.0.0 Build 20181120 devices allows an unauthenticated attacker to reboot the device via a reboot.cgi request.
CVE#: CVE-2019-18193 Published Date: 2020-02-03 CVSS: NO CVSS
Description: In Unisys Stealth (core) 3.4.108.0, 3.4.209.x, 4.0.027.x and 4.0.114, key material may be inadvertently logged if certain diagnostics are enabled.
CVE#: CVE-2019-18567 Published Date: 2020-02-03 CVSS: NO CVSS
Description: Bromium client version 4.0.3.2060 and prior to 4.1.7 Update 1 has an out of bound read results in race condition causing Kernel memory leaks or denial of service.
CVE#: CVE-2019-19119 Published Date: 2020-02-03 CVSS: NO CVSS
Description: An issue was discovered in PRTG 7.x through 19.4.53. Due to insufficient access control on local registry keys for the Core Server Service, a non-administrative user on the local machine is able to access administrative credentials.
CVE#: CVE-2019-19273 Published Date: 2020-02-04 CVSS: NO CVSS
Description: On Samsung mobile devices with O(8.0) and P(9.0) software and an Exynos 8895 chipset, RKP (aka the Samsung Hypervisor EL2 implementation) allows arbitrary memory write operations. The Samsung ID is SVE-2019-16265.
CVE#: CVE-2019-19968 Published Date: 2020-02-04 CVSS: NO CVSS
Description: PandoraFMS 742 suffers from multiple XSS vulnerabilities, affecting the Agent Management, Report Builder, and Graph Builder components. An authenticated user can inject dangerous content into a data store that is later read and included in dynamic content.
CVE#: CVE-2019-20174 Published Date: 2020-02-03 CVSS: NO CVSS
Description: Auth0 Lock before 11.21.0 allows XSS when additionalSignUpFields is used with an untrusted placeholder.
CVE#: CVE-2019-20446 Published Date: 2020-02-02 CVSS: NO CVSS
Description: In xml.rs in GNOME librsvg before 2.46.2, a crafted SVG file with nested patterns can cause denial of service when passed to the library for processing. The attacker constructs pattern elements so that the number of final rendered objects grows exponentially.
CVE#: CVE-2019-4451 Published Date: 2020-02-04 CVSS: NO CVSS
Description: IBM Security Identity Manager 6.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 163493.
CVE#: CVE-2019-4540 Published Date: 2020-02-04 CVSS: NO CVSS
Description: IBM Security Directory Server 6.4.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 165813.
CVE#: CVE-2019-4541 Published Date: 2020-02-04 CVSS: NO CVSS
Description: IBM Security Directory Server 6.4.0 uses incomplete blacklisting for input validation which allows attackers to bypass application controls resulting in direct impact to the system and data integrity. IBM X-Force ID: 165814.
CVE#: CVE-2019-4548 Published Date: 2020-02-04 CVSS: NO CVSS
Description: IBM Security Directory Server 6.4.0 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 165950.
CVE#: CVE-2019-4550 Published Date: 2020-02-04 CVSS: NO CVSS
Description: IBM Security Directory Server 6.4.0 is deployed with active debugging code that can create unintended entry points. IBM X-Force ID: 165952.
CVE#: CVE-2019-4551 Published Date: 2020-02-04 CVSS: 1.4
Description: IBM Security Directory Server 6.4.0 does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas. IBM X-Force ID: 165953.
CVE#: CVE-2019-4562 Published Date: 2020-02-04 CVSS: 1.4
Description: IBM Security Directory Server 6.4.0 stores sensitive information in URLs. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referer header or browser history. IBM X-Force ID: 166623.
CVE#: CVE-2019-4674 Published Date: 2020-02-04 CVSS: NO CVSS
Description: IBM Security Identity Manager 7.0.1 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 171510.
CVE#: CVE-2019-4675 Published Date: 2020-02-04 CVSS: NO CVSS
Description: IBM Security Identity Manager 7.0.1 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 171511.
CVE#: CVE-2019-4732 Published Date: 2020-02-03 CVSS: NO CVSS
Description: IBM SDK, Java Technology Edition Version 7.0.0.0 through 7.0.10.55, 7.1.0.0 through 7.1.4.55, and 8.0.0.0 through 8.0.6.0 could allow a local authenticated attacker to execute arbitrary code on the system, caused by DLL search order hijacking vulnerability in Microsoft Windows client. By placing a specially-crafted file in a compromised folder, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 172618.
CVE#: CVE-2019-9501 Published Date: 2020-02-03 CVSS: NO CVSS
Description: The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. By supplying a vendor information element with a data length larger than 32 bytes, a heap buffer overflow is triggered in wlc_wpa_sup_eapol. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
CVE#: CVE-2019-9502 Published Date: 2020-02-03 CVSS: NO CVSS
Description: The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
CVE#: CVE-2019-9674 Published Date: 2020-02-04 CVSS: NO CVSS
Description: Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.
----Hacking Updates----
buserror updated simavr. This repo has 915 stars and 73 watchers. This repo was created on 2012-05-14. --- simavr is a lean, mean and hackable AVR simulator for linux & OSX Link to Repo
JJkip updated hacking-with-swift. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-13. --- None Link to Repo
hhvm updated user-documentation. This repo has 85 stars and 14 watchers. This repo was created on 2015-07-27. --- Documentation for those that use HHVM and write Hack code. http://twitter.com/HHVMDocCommits Link to Repo
hackclub updated workshops. This repo has 3 stars and 4 watchers. This repo was created on 2020-01-07. --- A new home for Hack Club Workshops (WIP) Link to Repo
thyroneproject updated Thyrone-Project. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-01. --- CS:GO BEST HACK Link to Repo
wtheisen updated TerminusBrowser. This repo has 24 stars and 4 watchers. This repo was created on 2017-06-11. --- CLI Reddit, Hacker News, 4chan, and lainchan browser Link to Repo
josephvisaac updated 1st-Project-2d-game. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-02. --- 1st Iron Hack Coding Boot-camp project: 2d video-game Link to Repo
wh-hackerexploit updated HackerExploit-v2. This repo has 8 stars and 2 watchers. This repo was created on 2019-12-22. --- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes. Link to Repo
abhaynayar updated ctf. This repo has 0 stars and 1 watchers. This repo was created on 2019-12-17. --- 🚩 hacking write-ups, notes Link to Repo
facebook updated hhvm. This repo has 16410 stars and 1095 watchers. This repo was created on 2010-01-02. --- A virtual machine for executing programs written in Hack. Link to Repo
dead-hosts updated The-Big-List-of-Hacked-Malware-Web-Sites_git_mitchellkrogza. This repo has 5 stars and 2 watchers. This repo was created on 2018-01-10. --- Test of https://github.com/mitchellkrogza/The-Big-List-of-Hacked-Malware-Web-Sites Link to Repo
aravindvnair99 updated Phishing. This repo has 4 stars and 1 watchers. This repo was created on 2019-04-15. --- Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. This is a demo of a phishing attack by a web site. Link to Repo
hipniusF updated mixEjerciciosJavaScript. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-29. --- Mix de Ejercicios JavaScript del Bootcamp de Hack a Boss por el alumno Marco Pérez González Link to Repo
vic4key updated Vutils. This repo has 5 stars and 1 watchers. This repo was created on 2018-05-12. --- Vutils or Vic Utilities is an utility library written in Modern C++ and for Modern C++. It helps your programming go easier, faster and simpler. Link to Repo
NoahSteam updated RomHackingTools. This repo has 3 stars and 1 watchers. This repo was created on 2018-04-20. --- Tools to help patching roms Link to Repo
Wurst-Imperium updated Wurst7. This repo has 58 stars and 6 watchers. This repo was created on 2019-09-04. --- Minecraft Wurst Hacked Client v7 Link to Repo
jcschubert updated hack-assembler. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-05. --- An Assembler for the Hack Computer Architecture. Link to Repo
miner updated hack. This repo has 0 stars and 1 watchers. This repo was created on 2015-10-20. --- Private Clojure hacks Link to Repo
hipniusF updated entregas-hab. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-25. --- Repositorio para las entregas de Hack A Boss del alumno Marco Pérez González. En la siguiente url se puede ver el resultado final de la última entrega a realizar: Link to Repo
praveenhm updated HackerNews-Bookmark. This repo has 14 stars and 4 watchers. This repo was created on 2013-03-08. --- Everyday collection of my Hacker news bookmark Link to Repo
ZQiu233 updated QTRHacker. This repo has 16 stars and 1 watchers. This repo was created on 2018-07-21. --- A hack for Terraria Link to Repo
jonasmagnusson updated hacking-setup. This repo has 1 stars and 1 watchers. This repo was created on 2020-01-30. --- Hacking tools and small scripts in CTFs and Bug Bounty. Link to Repo
RedHatNordicsSA updated iot-hack. This repo has 2 stars and 7 watchers. This repo was created on 2020-01-22. --- Hack event with Red Hat products and IoT devices Link to Repo
hackforla updated website. This repo has 12 stars and 16 watchers. This repo was created on 2018-04-18. --- Hack for LA's website Link to Repo
DFHack updated dfhack. This repo has 922 stars and 110 watchers. This repo was created on 2010-02-14. --- Memory hacking library for Dwarf Fortress and a set of tools that use it Link to Repo
----Security Updates----
dewebdes updated Iranian-Cyber-Army. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-04. --- Pure Security Development Link to Repo
mgmeisinger updated Py3.0-Security-Suite. This repo has 1 stars and 1 watchers. This repo was created on 2019-11-19. --- Terminal-based system with three programs: Authenticator, Pwd Cracker, Pwd Evaluator Link to Repo
Whonix updated Whonix. This repo has 381 stars and 72 watchers. This repo was created on 2012-05-28. --- Whonix is an operating system focused on anonymity, privacy and security. It's based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP. https://www.whonix.org Link to Repo
lf-edge updated eve. This repo has 122 stars and 19 watchers. This repo was created on 2019-04-19. --- EVE is Edge Virtualization Engine Link to Repo
CodaProtocol updated coda. This repo has 381 stars and 27 watchers. This repo was created on 2017-12-18. --- Coda is a new cryptocurrency with a constant size blockchain, improving scaling while maintaining decentralization and security. Link to Repo
trimstray updated nginx-admins-handbook. This repo has 10992 stars and 325 watchers. This repo was created on 2019-01-28. --- How to improve NGINX performance, security, and other important things. Link to Repo
project-everest updated hacl-star. This repo has 1257 stars and 102 watchers. This repo was created on 2016-06-23. --- HACL*, a formally verified cryptographic library written in F* Link to Repo
motzne updated security.enz.lu. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-09. --- None Link to Repo
jzharris updated 209AS-Embedded-Security. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-22. --- Special Topics in Circuits and Embedded Systems: Security and Privacy for Embedded Systems, Cyber-Physical Systems, and Internet of Things Link to Repo
andrew-chang-dewitt updated rpi-security-gpio2mqtt. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-21. --- A docker image for reading GPIO input from a PIR & publishing a message via MQTT on detection Link to Repo
Psy367 updated Psy-Plosion. This repo has 1 stars and 1 watchers. This repo was created on 2019-10-24. --- "Salute in salutations world‐wisely, electric air‐wavers, temporal materialists, the bloody dirty and non for we all swim in Sol. Alleviated we, Quasi‐Satya⸗Empyrean‐Theatre modifying in intent extend our reach into the abysmal‐abyssal of the deepest quarks to the incredibly expansive superstar‐clusters. You may all rest in peace your security is assured. Prestigious, of heightest order our leveraging solicitors and hardened, bleach marshal‐militant enforcers will claim existence."(+∞-~∞)psy367. Link to Repo
haroonawanofficial updated flameapk. This repo has 13 stars and 3 watchers. This repo was created on 2019-11-05. --- Artifical Intelligence Suite for Android Application Security Link to Repo
pivotal-cf updated docs-pcf-security. This repo has 3 stars and 43 watchers. This repo was created on 2017-01-25. --- None Link to Repo
Galmeno updated ContingencyPlan. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-05. --- Risk management is normally a field of large corporations, however smaller businesses are often exposed to more direct risk exposures due to lack of spend on security. I want to build a easy-to-maintain contingency planning tool for the small and growing business. Link to Repo
tuliogoncalves5 updated spring. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-05. --- Project JAVA, Spring Boot, Web, JPA, Devtools, Security, Thymeleaf, PostgreSQL Link to Repo
limetech updated sysdream. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-05. --- Mitigation for security vulnerability reported by sysdream.com Link to Repo
JulienRC updated API_Security. This repo has 0 stars and 2 watchers. This repo was created on 2020-01-15. --- VET - Projet Link to Repo
nusenu updated OrNetStats. This repo has 15 stars and 2 watchers. This repo was created on 2017-05-08. --- Stats about the Tor network (website) Link to Repo
nusenu updated OrNetRadar. This repo has 3 stars and 2 watchers. This repo was created on 2017-06-08. --- Automatically detected Relay Groups on the Tor Network Link to Repo
ntop updated ntopng. This repo has 3095 stars and 140 watchers. This repo was created on 2015-04-30. --- Web-based Traffic and Security Network Traffic Monitoring Link to Repo
aelkz updated microservices-security. This repo has 2 stars and 2 watchers. This repo was created on 2019-09-14. --- This project is a demonstration on how to add security layer on applications using Red Hat Single Sign-On, Fuse and 3Scale. Link to Repo
CSVNetLab updated VanetSecurity. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-05. --- None Link to Repo
hectorm updated hblock-resolver. This repo has 9 stars and 2 watchers. This repo was created on 2018-06-11. --- A Docker image of Knot DNS Resolver with hBlock. Link to Repo
rehamashrafshouman updated Security-Ciphers. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-05. --- My CSE codes for security subject Link to Repo
cilium updated cilium. This repo has 4973 stars and 196 watchers. This repo was created on 2015-12-16. --- API-aware Networking and Security using eBPF and XDP Link to Repo
----PoC Updates----
companieshouse updated poc-ch-sdk-node. This repo has 0 stars and 26 watchers. This repo was created on 2020-02-03. --- Proof of Concept for an SDK for Node.JS written in JavaScript Link to Repo
ReillyKeith updated PrivateGroupChat. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-30. --- This is a demo proof of concept Link to Repo
jjgccg updated f35v2. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-31. --- Classfied proof of concept stuff, you know. Link to Repo
corkami updated pocs. This repo has 977 stars and 70 watchers. This repo was created on 2015-03-26. --- Proof of Concepts (PE, PDF...) Link to Repo
alxdavids updated voprf-poc. This repo has 4 stars and 3 watchers. This repo was created on 2019-12-01. --- Proof-of-concept implementation of the (V)OPRF protocol in https://datatracker.ietf.org/doc/draft-irtf-cfrg-voprf/ Link to Repo
fatihyildizli updated spiderfy. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-22. --- 🕷 crawling , 🕸 scraping | Tech stack: (🍃 Spring boot , 🌐 Selenium, 🗃 Jsoup, 🧾Tesseract ⚛️ React.js ) This project is only proof of concepts, does not relate commercial use. Link to Repo
MaxWMacaluso updated Team-Matrix. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-05. --- Rapid Prototyping Proof of Concept Link to Repo
amit8-88 updated learningjava. This repo has 0 stars and 1 watchers. This repo was created on 2017-10-16. --- A collection of proof-of-concept programs which help in grasping the concepts of the java language. Link to Repo
joncolque updated fcmreactnative. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-04. --- Integrating Firebase Cloud Messaging on React Native. Proof of concept. Link to Repo
gsmalley10 updated QuickBite. This repo has 0 stars and 1 watchers. This repo was created on 2019-09-15. --- Proof-of-concept food delivery app 🍔 Link to Repo
tflearydev updated React-Parts. This repo has 0 stars and 2 watchers. This repo was created on 2020-01-21. --- Simple React.js Proof of Concept for a Daimler project, client side lives in my-app folder Link to Repo
970037201 updated Console-ZORK-application. This repo has 0 stars and 2 watchers. This repo was created on 2020-02-02. --- This is a simple proof of concept that I am trying out to self educate myself. Link to Repo
iRaySpace updated nutrition_app. This repo has 0 stars and 1 watchers. This repo was created on 2019-12-14. --- Thesis' Proof-of-Concept App Link to Repo
outlandnish updated poc-vpn-detection. This repo has 17 stars and 0 watchers. This repo was created on 2020-02-05. --- Proof of Concept for simple Javascript based VPN detection Link to Repo
ldz-w updated proof-of-concept. This repo has 0 stars and 1 watchers. This repo was created on 2019-12-16. --- TecDoc Proof Of Concept Link to Repo
Darrekt updated Sprout. This repo has 0 stars and 1 watchers. This repo was created on 2020-01-30. --- Marketing website and front-end interface for a proof-of-concept IoT device! Link to Repo
lorenzosinisi updated retex. This repo has 18 stars and 4 watchers. This repo was created on 2019-11-04. --- A boilerplate/proof-of-concept for a Rete Algorithm implementation in Elixir Link to Repo
JHDeerin updated notesPageTest. This repo has 0 stars and 0 watchers. This repo was created on 2018-06-13. --- A quick-n'-dirty proof of concept page for my school notes Link to Repo
awtyler updated beacon-bt-poc. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-05. --- Proof-of-Concept app that utilizes Beacons to activate Bluetooth devices in the background Link to Repo
MengxuanChen updated Messaging-API. This repo has 0 stars and 1 watchers. This repo was created on 2020-02-05. --- Proof of concept Link to Repo
zrrrzzt updated lndr-poc. This repo has 0 stars and 1 watchers. This repo was created on 2019-12-29. --- Proof of concept for lndr Link to Repo
zcash updated zcash-android-wallet-sdk. This repo has 20 stars and 6 watchers. This repo was created on 2018-10-05. --- Wallet Proof of Concept Link to Repo
ForumViriumHelsinki updated CityLogistics. This repo has 0 stars and 4 watchers. This repo was created on 2019-12-03. --- Proof of concept app for last mile city logistics Link to Repo
Fattigman updated projectHt2019Jacob. This repo has 0 stars and 2 watchers. This repo was created on 2019-11-15. --- A proof of concept plugin for gene coexpression network with the ability to add personalized modules. Link to Repo
adamstewart1980 updated PoC. This repo has 0 stars and 1 watchers. This repo was created on 2014-07-16. --- Dumping ground for my proof of concepts and tech spikes Link to Repo
----#MALWARE----
quttera --> #Quttera FREE Web #Malware Scanner https://t.co/0eUOW7jUlk Keep your website safe! #HTML #JavaScript. Link with Tweet
AaronCuddeback --> RT @quttera: #Quttera #website #malware #scanner #API https://t.co/X3enkxwAA0 #wordpress #joomla #javascript #cybersec Link with Tweet
cybersec_feeds --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
quttera --> #Quttera #website #malware #scanner #API https://t.co/X3enkxwAA0 #wordpress #joomla #javascript #cybersec Link with Tweet
devopsdotcom --> Cybereason discovered a malware campaign that has been leveraging Bitbucket repositories from Atlassian to launch c… https://t.co/zQT6ZYipRn Link with Tweet
quttera --> Website Anti #Malware for Small and Medium Business â Myths Revealed * #Quttera web security blog https://t.co/KcmhZ1jnvN Link with Tweet
CapitalAreaSIM --> RT @CSOonline: The sizable fines assessed for #databreaches in 2019 suggest that regulators are getting more serious about companies that d…
risksint --> RT @colCERT: !Alerta! campaña maliciosa está siendo enviada por correo electrónico a nombre de la @Registraduria con asunto “Su cedula de c…
securityblvd --> Check out latest blog from Michael Vizard: Cybereason discovered a malware campaign that has been leveraging Bitbu… https://t.co/wBYRFwWxLS Link with Tweet
sectest9 --> RT @rtehrani: #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity #cybercrime #cyberat… Link with Tweet
CyberSecurityN8 --> RT @rtehrani: #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity #cybercrime #cyberat… Link with Tweet
rtehrani --> #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity… https://t.co/vyx6h3vwMe Link with Tweet Link with Tweet
Veracode --> Despite a decrease in malicious activity in the fourth quarter of 2019, Emolet #malware threats continue to thrive:… https://t.co/dzKZOQlX8m Link with Tweet
ochsenmeier --> Emotet detection tool #DFIR #malware
https://t.co/kdOIMvqTQ2 Link with Tweet
MaltrakN --> RT @xristfer: ⚠️ #Cybersecurity 🔓vulnerabilities discovered in the desktop client of #WhatsApp expose #Mac & #Windows 🖥️ users to #phishin…
----#PHISHING----
Ironcove --> The ways your personal information can be obtained are becoming more complex to detect. Read here for some tips on… https://t.co/du2HdT6j3a Link with Tweet
kupruz --> RT @InspiredeLearn: “Thanks to massive botnets, attackers are generating large-scale spam campaigns on-demand and immediately using them to…
TopCyberNews --> RT @TopCyberNews: Stop. Think. Connect.
#CyberSecurity #CyberAware #Data #InfoSec #Cybercrime
95% of successful attacks on enterprise net…
Arianna_FCG --> "Il phishing è una delle minacce più diffuse e una delle più pericolose. Si stima che un’email su 99 sia un tentati… https://t.co/qsmnwKG9Eb Link with Tweet
phishin4pebbles --> RT @JamBase: #2nd #phish song during Super Bowl = “Free” #weareeverywhere https://t.co/V3K7h88Ill
Karambolager --> RT @CofenseIntel: What trends in the #phishing threat landscape did we observe over the last 3 months? And what can you expect in the comin…
cybersec_feeds --> RT @CofenseIntel: What trends in the #phishing threat landscape did we observe over the last 3 months? And what can you expect in the comin…
sectest9 --> RT @rtehrani: #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity #cybercrime #cyberat… Link with Tweet
CyberSecurityN8 --> RT @rtehrani: #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity #cybercrime #cyberat… Link with Tweet
BarracudaMSP --> Our next #webinar is available tomorrow! Join us as we explain whey #MSPs should add an advanced… https://t.co/i0PDYcBgME Link with Tweet
ItsBouse --> RT @Ledger_Support: 🚨Attention #Ledger $XRP users🚨
There's an ongoing #phishing attempt targetting #XRP users.
⚠️If you receive a random,…
InspiredeLearn --> “Thanks to massive botnets, attackers are generating large-scale spam campaigns on-demand and immediately using the… https://t.co/dpWtrSN8U9 Link with Tweet
SyndicusInc --> Is #CyberTraining part of your new employee #OnBoarding? It should be! https://t.co/F5x80He5AE #HR #HumanResources… https://t.co/gYUf58VQ3c Link with Tweet Link with Tweet
rtehrani --> #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity… https://t.co/vyx6h3vwMe Link with Tweet Link with Tweet
SocEngineerInc --> Cybercriminal impersonates executive to request information on New York nursing center patients… https://t.co/joelFJBquh Link with Tweet
----#OSINT----
Daniel33610502 --> https://t.co/49dd212h8x #ftp file search
https://t.co/CXGNCcqffV #deepweb #osint tool
https://t.co/2WvIDfGYbP #wireless mapping Link with Tweet Link with Tweet Link with Tweet
EdGtslFcbngq6sk --> RT @lampyre_io: Do your #OSINT sock puppet user pics still look like stock ones? Try this unique face generator! It works on the basis of A…
EdGtslFcbngq6sk --> RT @sprp77: Tinder search tools #tinder #osint #dating #hacks #search
https://t.co/R6zusAPhvY
https://t.co/m8SYY7QQlU
https://t.co/snEHD0… Link with Tweet Link with Tweet
InquisitorH3x --> ~ (1.00)^365 = 1.00 /current state.
~ (1.01)^365 = 37.7 /+small consistent change.
- I constantly remind myself o… https://t.co/iQWnHUFH8y Link with Tweet
sprp77 --> TikTok search tools #tiktok #osint #search
https://t.co/IGkZxvWqfC
https://t.co/HYfxhXz1PW
https://t.co/Lw1Bwpaj4Y… https://t.co/smQ1GyFrpE Link with Tweet Link with Tweet Link with Tweet Link with Tweet
jabnehov --> RT @fs0c131y: In this thread, I did a deep dive into the companies behind the faulty app during the #IowaCaucuses2020. I added all the sour…
akawombat42 --> RT @lampyre_io: Do your #OSINT sock puppet user pics still look like stock ones? Try this unique face generator! It works on the basis of A…
luis87c --> RT @Hakin9: TorBot - Open Source Intelligence Tool for the Dark Web https://t.co/tOcEyx8dXa
#infosec #hacking #hackers #Pentesting #progr… Link with Tweet
1234hormiga --> RT @PutinIsAVirus: USS Harry Truman in multiple satellite spottings in last couple of weeks.
Interestingly compared to past she appears to…
ShakiraSecurity --> RT @lampyre_io: Do your #OSINT sock puppet user pics still look like stock ones? Try this unique face generator! It works on the basis of A…
RDSWEB --> RT @ArrowontheHill: NBC Sky World News #osint unit is looking for journalists! Today’s challenge - a nuclear engineer is about to leave Hea…
RDSWEB --> RT @sherrod_im: See the awesome work from @peteruxer
The flowcharts are really good here. #OSINT
https://t.co/9s1dy7D5vQ Link with Tweet
RDSWEB --> RT @lampyre_io: Do your #OSINT sock puppet user pics still look like stock ones? Try this unique face generator! It works on the basis of A…
SourcingLover --> RT @lampyre_io: Do your #OSINT sock puppet user pics still look like stock ones? Try this unique face generator! It works on the basis of A…
n3r0x42 --> RT @sherrod_im: See the awesome work from @peteruxer
The flowcharts are really good here. #OSINT
https://t.co/9s1dy7D5vQ Link with Tweet
----#THREATINTEL----
rickhholland --> If you love #threatintel and don't take yourself too seriously, apply for our .@digitalshadows Director of Intellig… https://t.co/3Mb4QEqxpT Link with Tweet
resecurity_com --> If you're building a #cybersecurity team this year, you definitely don't want to miss a recent podcast with our CEO… https://t.co/dIZOYVeJmm Link with Tweet
rickhholland --> Not only do we work together to produce high quality #ThreatIntel, but we also work together to produce high qualit… https://t.co/8DvZ64N3Mh Link with Tweet
rickhholland --> Whatever you do, don’t apply for this .@digitalshadows Director of Intelligence role unless you can sing.… https://t.co/CvoqEBLDCC Link with Tweet
SourceILS --> RT @SourceILS: Democracy Defenders Like AI: The Future of Artificial Intelligence for the US Intelligence Community
https://t.co/CmHy232NGa… Link with Tweet
cyberreport_io --> USB armory Mk II: A secure computer on a USB stick featuring open source hardware design - Help Net Security… https://t.co/KMuJ6IP8yk Link with Tweet
RossMcPhaden --> RT @happygeek: By me @Forbes and @ForbesEurope: Google gets critical Android vulnerability patch rolling, but fragmented ecosystem undermin…
SourceILS --> RT @SourceILS: Genius Machines: The Future of Intelligence and Elite Soldiering
https://t.co/M4lP0zhjtW
#AI #ML #MachineLearning #ThreatInt… Link with Tweet
ThisMustStop5 --> RT @TrendMicro: Were you affected by the CVE-2020-0601 vulnerability? Use our Vulnerability Assessment Tool to find out if you're properl…
GRBail --> RT @likethecoins: My first-ever @redcanaryco blog is live! I hope this helps people discuss attribution in a more productive way. #threatin…
Reynolds_Global --> RT @TrendMicro: Were you affected by the CVE-2020-0601 vulnerability? Use our Vulnerability Assessment Tool to find out if you're properl…
FortinetFinServ --> #Cybercriminals continue to modify their attack strategies to increase accuracy and achieve their primary goals. Le… https://t.co/hG5UKuLEeh Link with Tweet
nscrutables --> RT @likethecoins: My first-ever @redcanaryco blog is live! I hope this helps people discuss attribution in a more productive way. #threatin…
SearchSecurity --> Download the latest issue of our online magazine "Information Security: Defending the Digital Infrastructure" here:… https://t.co/VZXmS6v9lI Link with Tweet
BongoFett7 --> RT @likethecoins: Today in my latest post, I share my top 10 recommendations for free resources to check out if you're getting started in #…
----#RANSOMWARE----
ESFERARED --> RT @ESFERARED: Y si, #Ransomware puede ser una forma de financiación como cualquier otra,#room39 https://t.co/7JHhFJArTt Link with Tweet
cybersec_feeds --> RT @Fabriziobustama: New strain of ransomware spreads via SYSVOL shares
By @BetaNews https://t.co/eam5TUhBcs
#Ransomware #CyberSecurity #… Link with Tweet
sectest9 --> RT @DavidJOberly: FTC Announces Improved Data Security Orders With Greater Specificity and Accountability: https://t.co/fNoDDIO9BX #cyberse… Link with Tweet
CyberSecurityN8 --> RT @DavidJOberly: FTC Announces Improved Data Security Orders With Greater Specificity and Accountability: https://t.co/fNoDDIO9BX #cyberse… Link with Tweet
sectest9 --> RT @rtehrani: #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity #cybercrime #cyberat… Link with Tweet
_israel_rivera --> RT @SonicWall: What is going on with the #Snake #EKANS ransomware? @WIRED takes a look at what @SentinelOne have been investigating - #rans…
CyberSecurityN8 --> RT @rtehrani: #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity #cybercrime #cyberat… Link with Tweet
DavidJOberly --> FTC Announces Improved Data Security Orders With Greater Specificity and Accountability: https://t.co/fNoDDIO9BX… https://t.co/O24LZJbKen Link with Tweet Link with Tweet
rtehrani --> #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity… https://t.co/vyx6h3vwMe Link with Tweet Link with Tweet
MikeOSecurity --> #Ransomware has been a threat for almost a decade now. There is no excuse for cities to be falling prey to these cr… https://t.co/nVK1SeFSfm Link with Tweet
DivergentCIO --> You Need to Know About Your Healthcare Breach https://t.co/y2ZhS8nbSi #Healthcare #Breach #HealthRecord #Security… https://t.co/0T6OCZi0tl Link with Tweet Link with Tweet
JF_Davis_ --> RT @menlosecurity: More than half of US organizations were affected by #ransomware and #phishing attacks last year according to new researc…
gdlinux --> #Ransomware is a serious threat to all organizations, and a successful attack can result in significant downtime, h… https://t.co/6AEnw2MaDV Link with Tweet
MaltrakN --> RT @xristfer: ⚠️ #Cybersecurity 🔓vulnerabilities discovered in the desktop client of #WhatsApp expose #Mac & #Windows 🖥️ users to #phishin…
mosterman --> RT @proofpoint: To Avoid Disruption, #Ransomware Victims Continue to Pay Up. https://t.co/Qeljs6XTsN #InfoSec Link with Tweet
-----#OPENDIR----
cybersec_feeds --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
sharmarohit19 --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
wsann --> RT @IronNetTR: Phishing page targeting University of Amsterdam logins at hxxp://caibw1eshop.club/loading/
#opendir #phishing @UvA_Amsterda…
IronNetTR --> Phishing page targeting Unity National Bank logins at hxxp://getaccesslive.com/unitynationalbk/system/login.php… https://t.co/BUMNuiROAs Link with Tweet
P3pperP0tts --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
P3pperP0tts --> RT @FewAtoms: #malware #opendir #infosec #threathunting #cybersecurity
hxxp://palmiericurtains.com/images/ https://t.co/ovYYHq4wwy
IronNetTR --> Phishing page targeting University of Amsterdam logins at hxxp://caibw1eshop.club/loading/
#opendir #phishing… https://t.co/8wNshxFGD2 Link with Tweet
MadyevilAnmol --> RT @FewAtoms: #malware #opendir #infosec #threathunting #cybersecurity
hxxp://palmiericurtains.com/images/ https://t.co/ovYYHq4wwy
_seyyid_ --> RT @FewAtoms: #malware #opendir #infosec #threathunting #cybersecurity
hxxp://palmiericurtains.com/images/ https://t.co/ovYYHq4wwy
dorkingbeauty1 --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
DaveBosasi --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
JAMESWT_MHT --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
sectest9 --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
CyberSecurityN8 --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
A_M_M_7_7 --> RT @FewAtoms: #malware #infosec #threathunting #cybersecurity #opendir
://cloudfilesharingdomainurllinksys.duckdns.org/big/
://cloudfilesha…
-----#MALSPAM----
TigzyRK --> Big "Annual bonus" #phishing currently sent through #malspam. I've seen 3 different emails in less than 30 mns. https://t.co/zQrDvtS6WM
sharmarohit19 --> RT @bit_dam: #malspam #macro detected in-the-wild by
@BitDamSecurity
Missed by Office365 for the past 4 hours (now blocked)
file sha1: 1d…
538355 --> RT @Chiardoni: Oggi, come ieri, strade di #Roma e mezzi di trasporto praticamente vuoti. E intanto i #Cracker sfruttano emotività e paura c…
cybersec_feeds --> RT @Chiardoni: Oggi, come ieri, strade di #Roma e mezzi di trasporto praticamente vuoti. E intanto i #Cracker sfruttano emotività e paura c…
Iglocska --> RT @D3LabIT: Today we have received 628 eMails of this malicious campaign! 🙄
Our #MISP Feed is full of details! 🤟
Thanks to the whole Twi…
Cryptolaemus1 --> RT @bit_dam: #malspam #macro detected in-the-wild by
@BitDamSecurity
Missed by Office365 for the past 4 hours (now blocked)
file sha1: 1d…
threat_osint --> RT @bit_dam: #malspam #macro detected in-the-wild by
@BitDamSecurity
Missed by Office365 for the past 4 hours (now blocked)
file sha1: 1d…
sectest9 --> RT @bit_dam: #malspam #macro detected in-the-wild by
@BitDamSecurity
Missed by Office365 for the past 4 hours (now blocked)
file sha1: 1d…
CyberSecurityN8 --> RT @bit_dam: #malspam #macro detected in-the-wild by
@BitDamSecurity
Missed by Office365 for the past 4 hours (now blocked)
file sha1: 1d…
ActorExpose --> RT @bit_dam: #malspam #macro detected in-the-wild by
@BitDamSecurity
Missed by Office365 for the past 4 hours (now blocked)
file sha1: 1d…
JAMESWT_MHT --> RT @bit_dam: #malspam #macro detected in-the-wild by
@BitDamSecurity
Missed by Office365 for the past 4 hours (now blocked)
file sha1: 1d…
M11Sec --> RT @bit_dam: #malspam #macro detected in-the-wild by
@BitDamSecurity
Missed by Office365 for the past 4 hours (now blocked)
file sha1: 1d…
bit_dam --> #malspam #macro detected in-the-wild by
@BitDamSecurity
Missed by Office365 for the past 4 hours (now blocked)
fi… https://t.co/eimcsE5bkQ Link with Tweet
iCyberFighter --> #Emotet Activity Rises as It Uses #Coronavirus Scare to Infect Targets in #Japan: https://t.co/wEf7hB2F8y |… https://t.co/SdskpZkfqj Link with Tweet Link with Tweet
autumn_good_35 --> RT @58_158_177_102: 日本語マルウェアメールの接到を確認しています。
Japanese #malspam observed.
Subject : DHL貨物配送
File Name : DHL 119040領収書、pdf.iso
Sample : https…
----#EMOTET----
Cryptolaemus1 --> URLhaus #emotet Epoch 2 IOC update
https://t.co/d6HH0NUXTi Link with Tweet
Cryptolaemus1 --> URLhaus #emotet Epoch 1 IOC update
https://t.co/05L3q5vDkc Link with Tweet
MakyCore --> RT @Slvlombardo: #EmoCheck, il tool che controlla se siamo stati infettati da #Emotet: ecco come funziona...
Il mio contributo via #CyberS…
HolgerJunker --> Currently collecting feature requests for ProcessBouncer that helps you prevent #emotet infections via DM https://t.co/tLocc9dhO4 Link with Tweet
TigermanRoot --> RT @Slvlombardo: #EmoCheck, il tool che controlla se siamo stati infettati da #Emotet: ecco come funziona...
Il mio contributo via #CyberS…
tuyoty --> RT @teamcymru: New #EmoCheck Tool Checks if You're Infected With #Emotet https://t.co/SXCV8CiTRM https://t.co/4wCtkZh6jE Link with Tweet
BBarnoux --> RT @teamcymru: New #EmoCheck Tool Checks if You're Infected With #Emotet https://t.co/SXCV8CiTRM https://t.co/4wCtkZh6jE Link with Tweet
malware28 --> RT @CofenseLabs: #emotet Sometimes makes mistakes... Here's their filename generation regex... https://t.co/LIkQSjpJJJ
megan_precious --> RT @USCERT_gov: ☠️ #MalwareMonday: #Emotet is a banking Trojan that functions as a downloader or dropper of other banking Trojans. It conti…
HaunterSec --> RT @CofenseLabs: #emotet Sometimes makes mistakes... Here's their filename generation regex... https://t.co/LIkQSjpJJJ
gh0std4ncer --> RT @Cryptolaemus1: #Emotet Daily Summary Post for 2020/02/04: E3 doc links hosting E1 docs? New loader on all 3 botnet distro 20:40-22:00UT…
malware28 --> Thanks @jpcert_en for this EmoCheck tool...My host is not infected
#Emotet
#Emocheck
#malware https://t.co/zpsgYtg2Uc
gh0std4ncer --> RT @CofenseLabs: #emotet Sometimes makes mistakes... Here's their filename generation regex... https://t.co/LIkQSjpJJJ
NelosoP --> RT @CofenseLabs: #emotet Sometimes makes mistakes... Here's their filename generation regex... https://t.co/LIkQSjpJJJ
gh0std4ncer --> RT @LadislavZezula: #Emotet DOCX files launch powershell.exe with BASE64 parameter, which is merged from (amongst other) document's variabl…
-----#BUGBOUNTY----
clevernyyyy --> RT @golfhackerdave: Bug Bounties are FUN especially when you get paid and can use free tools like @contrastsec CE https://t.co/9xp40X3USr #… Link with Tweet
davidtavarez --> RT @CyberWarship: Exploiting File Uploads Pt. 2 – A Tale of a $3k worth RCE.
#infosec #pentest #bugbounty
https://t.co/mBC2BdxjXL https:/… Link with Tweet
myrmidae --> RT @scspcommunity: Into #bugbounties? Here's how you can take your #bugbounty game to a higher level!!
#bugbountytips #bugbounty #bughunti…
YoKoAcc --> RT @intigriti: How to Pwn A Pwned Citrix? Is it possible to upgrade your recon with the @discordapp and tweeted @jobertabma the best #bugbo…
steemdollars --> RT @insolario: #Insolar launches a bug #bounty program with leading ethical-hacker platform @Hacker0x01 to test its products.
Learn more:…
CyberSecurityN8 --> RT @hackison: #bugbounty #bugbountytips #hackison #cybersecurity #hacking #hacker #wapt #vapt #pentesting #penetrationtesting https://t.co/…
sectest9 --> RT @hackison: #bugbounty #bugbountytips #hackison #cybersecurity #hacking #hacker #wapt #vapt #pentesting #penetrationtesting https://t.co/…
karma_coded --> RT @hackison: #bugbounty #bugbountytips #hackison #cybersecurity #hacking #hacker #wapt #vapt #pentesting #penetrationtesting https://t.co/…
atabishofficial --> RT @scspcommunity: Into #bugbounties? Here's how you can take your #bugbounty game to a higher level!!
#bugbountytips #bugbounty #bughunti…
wopot --> RT @CyberWarship: Exploiting File Uploads Pt. 2 – A Tale of a $3k worth RCE.
#infosec #pentest #bugbounty
https://t.co/mBC2BdxjXL https:/… Link with Tweet
intx0x80 --> RT @intigriti: How to Pwn A Pwned Citrix? Is it possible to upgrade your recon with the @discordapp and tweeted @jobertabma the best #bugbo…
Yumi_Sec --> Play with your HTTP headers, you can get a ton of
interesting behaviors in web applications solely by adding/removi… https://t.co/IRQgQ1nmR0 Link with Tweet
intigriti --> How to Pwn A Pwned Citrix? Is it possible to upgrade your recon with the @discordapp and tweeted @jobertabma the be… https://t.co/voOXh4eFhk Link with Tweet
FullDepo --> RT @insolario: #Insolar launches a bug #bounty program with leading ethical-hacker platform @Hacker0x01 to test its products.
Learn more:…
security_prince --> RT @PentesterLand: How to reach “cosmic brain level 10”, which bugs are dead 'cause of Samesite, IDORs the gift that keeps on giving, and m…
----#CYBERCRIME----
ZurichAdvocacy --> #CyberCrime is an ever-evolving threat that affects every industry. Zurich aims to be a market leader in combating… https://t.co/Tv4hYZhDFY Link with Tweet
TopCyberNews --> RT @TopCyberNews: Stop. Think. Connect.
#CyberSecurity #CyberAware #Data #InfoSec #Cybercrime
95% of successful attacks on enterprise net…
cyansol --> Is it time your charity gained your Cyber Essentials accreditation?
#cybersecurity #cybercrime #cyberattack… https://t.co/B2Cui30Ora Link with Tweet
lifesciences_GE --> How vulnerable is healthcare to cyber-attack? Ian Trump explores the answer in this blog. @phathobbit… https://t.co/5vWIzRWK1V Link with Tweet
CMoschovitis --> German Researchers Accessed Service Members’ Sensitive Medical Data—and One Lawmaker Wants Answers
A Democratic law… https://t.co/O2UhPHfYUl Link with Tweet
sectest9 --> RT @rtehrani: #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity #cybercrime #cyberat… Link with Tweet
CyberSecurityN8 --> RT @rtehrani: #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity #cybercrime #cyberat… Link with Tweet
rtehrani --> #PolySwarm Pitches polyX Shared Threat Intelligence - MSSP Alert https://t.co/2E8kE6OM1G
#Cybersecurity… https://t.co/vyx6h3vwMe Link with Tweet Link with Tweet
avimimoun --> RT @NSConclave: "Avoid the Gates of Hell. Use Unix"
Net Square @Net_Square_ conduct "TechieThursday" on every thursday to share knowledge w…
saltcontrol --> Australian police usage of new anti-encryption laws is on the rise
https://t.co/8G6YmPM264
#CyberCrime… https://t.co/Ts4TKDeO3N Link with Tweet Link with Tweet
kaywhiteley1 --> RT @VanessaConIT: Have you signed up to attend our first #cybersecurity event tomorrow?
If not there is still time! Just drop me a DM to…
cyberse85817495 --> RT @PopcornSecurity: Did you know more than 1 in 5 #websites operated by #airports contain publicly known and exploitable #vulnerabilities,…
dariosailor86 --> RT @TheStartupMento: rt @raconteur
cc @antgrasso @fisher85m @mikequindazzi
#cybercrime can impact an organisation’s reputation, customer ba…
sectest9 --> RT @AllianceNwc: Check out this graphic that explains what type of CYBER ATTACKS occurred last year & the potentially TRIGGERED POLICIES!…
CyberSecurityN8 --> RT @AllianceNwc: Check out this graphic that explains what type of CYBER ATTACKS occurred last year & the potentially TRIGGERED POLICIES!…
RedDrip7: It should be #CVE-2019-1367 rather than #CVE-2020-0674, and seems targeting #China from #Darkhotel #APT group. https://t.co/5QGHq98Q2i Link to Tweet
blackorbird: #ATTCK #PenetrationTest
chinese version Link to Tweet
https://t.co/vLWYryRoSi Link to Tweet
wugeej: [PoC] Heap Overflow in F-Secure Internet Gatekeeper
https://t.co/ECQFCLFQnF Link to Tweet
wugeej: Hackers have already compromised more than 2,300 systems.
https://t.co/hzekYhcnQQ Link to Tweet
wugeej: @icchyr Maybe Link to Tweet
wugeej: Turkey Turk Hack Team Presents DDoS Attack on Chinese Network
https://t.co/L1qGIUsTsl https://t.co/BPRn3cXduM Link to Tweet
wugeej: WordPress sites potentially exposed to hack due to Code Snippets flaw
[Demo Video] https://t.co/7vdBz9bJew Link to Tweet
malware_traffic: 2020-02-03 - #malspam with attachment for #Emotet epoch 2 - Paste of headers/message text: https://t.co/dp33lyFbi6 - Pastebin raw: https://t.co/Twvet7dV1H - Sandbox analysis of Word doc: https://t.co/nxACjl64Bp https://t.co/lFeCudMQJG Link to Tweet
malware_traffic: Thanks to everyone who replied. Confirmed it's #Dridex, which is something I've seen from #RigEK in recent weeks. Link to Tweet
malware_traffic: 2020-02-03 - #malspam pushing #Qbot (#Qakbot) - email spoofed a Gmail address from a mailbox on a lab host I infected last year - The message is completely made up - Paste: https://t.co/UrcT4NCQbj - Pastebin raw: https://t.co/sNTIPfcA0E - Sandbox analysis: https://t.co/kw0cVyxeq3 https://t.co/MutzPv4gBv Link to Tweet
malware_traffic: 2020-02-03 - #Trickbot gtag ono29 - from PDF attachments in emails: Example of the PDF attachment available at: https://t.co/6500Lf3FSt - Link in PDF file --> password-protected zip archive (password in PDF message text) --> Trickbot EXE disguised as some sort of document/report https://t.co/zJFnsFHUmJ Link to Tweet
malware_traffic: 2020-02-03 - #Trickbot EXE files from URLs ending in ".png" - caused by Trickbot's mshareDll/mwormDll/TabDll modules - Paste of info: https://t.co/txhHVMjUnF - Pastebin raw: https://t.co/xUERRL4c7f https://t.co/L1eGZMBMpu Link to Tweet
jeromesegura: @AffableKraut @olihough86 @EKFiddle It started with EKs, but is for malicious HTTP/S traffic of any kind: malvertising, browlocks, web skimmers, C2 call backs, etc
Comes with public regexes but you can add your custom ones too. Link to Tweet