Latest Security News
-
Apple pushes first Background Security Improvements update to fix WebKit
flaw
-
Apple has released its first Background Security Improvements update to fix
a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs without
req...
8 hours ago
-
EU sanctions Chinese and Iranian actors over cyberattacks on critical
infrastructure
-
EU sanctions Chinese and Iranian firms and individuals for cyberattacks
targeting critical infrastructure and over 65,000 devices across member
states. The...
11 hours ago
-
South Korean Police Accidentally Post Cryptocurrency Wallet Password
-
An expensive mistake:
Someone jumped at the opportunity to steal $4.4 million in crypto assets
after South Korea’s National Tax Service exposed publicly ...
23 hours ago
-
Update: oledump.py Version 0.0.85
-
Fixing newlines in some plugins. oledump_V0_0_85.zip (http)MD5:
D972CE411B395EF77DBCE9A63059E8C1SHA256:
721C095F3126745A42720316A0B3AC1BCCB9DCDBBA9FF59F5FE...
1 day ago
-
When AI hallucinations turn fatal: how to stay grounded in reality |
Kaspersky official blog
-
A 36-year-old American man took his own life after two months of
interacting with Gemini, with the chatbot reportedly pushing the concept of
digital immort...
1 day ago
-
-
馃敆 Connecting Claude AI with Kali Linux & Burp Suite via MCP
The Practical Guide to AI-Augmented Penetration Testing in 2026
馃搮 March 2026 ✍️ altcoinwonder...
2 days ago
-
IoCs (Indicators of Compromise) for the Coruna iOS iPhone Web Malware
Client Side Exploits Serving Web Malware Exploitation Kit
-
Dear blog readers,
I recently took the time and effort and do some research on the recently
made public Coruna iOS iPhone client-side exploits serving we...
4 days ago
-
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
-
A hacktivist group with links to Iran's intelligence agencies is claiming
responsibility for a data-wiping attack against Stryker, a global medical
technol...
6 days ago
-
讛讙诇讬讜谉 讛诪讗讛 砖诪讜谞讬诐 讜砖诇讜砖讛 砖诇 DigitalWhisper 砖讜讞专专!
-
讛讙诇讬讜谉 讛诪讗讛 砖诪讜谞讬诐 讜砖诇讜砖讛 砖诇 DigitalWhisper 砖讜讞专专!驻讜专住诐 讘- March 1, 2026
16:56:42, 注诇 讬讚讬- sapirxfed
讘专讜讻讬诐 讛讘讗讬诐 诇讚讘专讬 讛驻转讬讞讛 砖诇 讛讙诇讬讜谉 讛-183 砖诇 Digital...
2 weeks ago
-
Happy 23rd Birthday TaoSecurity Blog
-
Happy birthday TaoSecurity Blog, born on this day in 2003!
The best way to digest the key lessons from this site is to browse my four
volume Best of Ta...
2 months ago
-
Recommended: MCP Is Broken and Anthropic Just Admitted It
-
I recommended MCP Is Broken and Anthropic Just Admitted It on TysonRhame.
About me: http://www.chuvakin.org
2 months ago
-
BestAV (Fake Antispyware affiliate) exposed
-
Hello everyone, it's been a while.
One of the first affiliate systems I ever infiltrated was BestAV, back in
2011, the same year I started XyliBox.
Over...
6 months ago
-
专注讬讜谉 诇砖讬驻讜专 讗讘讟讞转 SSL VPN – 爪诪爪讜诐 诪砖讟讞 讛转拽讬驻讛 砖诇 讛-Gateway 注诇 讬讚讬 诪转谉 讙讬砖讛
专拽 诇诇拽讜讞讜转 DDNS 砖讗讜砖专讜 诪专讗砖
-
(砖诇讜诐 专讘 拽讜专讗讬诐 讬拽专讬诐 – 讗诐 讗转诐 诪讻讬专讬诐 诪讬砖讛讜 砖注讜讘讚 注讘讜专 讬爪专谞讬转 砖诇 SSL VPN –
讘驻讬转讜讞 转讜讻谞讛, 谞讬讛讜诇 诪讜爪专 讜讻讚讜诪讛, 讗谞讗 砖诇讞讜 诇讜 讗讜 诇讛 拽讬砖讜专 诇驻讜住讟 讛讝讛, 讘转拽讜讜讛
砖讛专...
7 months ago
-
Readying hospital defenses for the AI-powered phishing surge
-
Artificial Intelligence
Privacy & Security
Workforce
As phishing tactics evolve, healthcare organizations need to act quickly to
shore up defenses and close...
8 months ago
-
How Security and Privacy Teams Break Barriers Together
-
While cybersecurity and data privacy leaders have distinct expertise, our
fundamental goals are aligned. By understanding each other’s perspectives
and pri...
8 months ago
-
Shodan-Dorks - Dorks for Shodan; a powerful tool used to search for
Internet-connected devices
-
This GitHub repository provides a range of search queries, known as
"dorks," for Shodan, a powerful tool used to search for Internet-connected
devices. T...
10 months ago
-
Andrew Hay’s 2025 Cybersecurity Predictions
-
As we approach 2025, the ever-evolving landscape of cybersecurity continues
to challenge professionals and organizations alike. Based on observed
trends an...
1 year ago
-
North Korean hackers posing as IT workers steal over $1B in cyberattack
-
North Korean hackers posing as IT workers steal over $1B in cyberattack
l33tdawg Fri, 11/29/2024 - 10:31
1 year ago
-
Eye care company suffers 377K-record data breach
-
Panorama Eyecare, a Fort… read more
1 year ago
-
-
What a lovely sunset
-
Oh, hi. Long time no blog, eh?
Well, it is time to sunset this blog, I will be deleting it in the next few
weeks.
So long, and thanks for all the fis...
2 years ago
-
Simple PHP webshell with php filter chains
-
Recently found an LFI in a PHP application and one of the cool things I
learned about recently was PHP filter chains. More info here:
https://www.synacktiv...
2 years ago
-
A Scam in the Family—How a Close Relative Lost $100,000 to an Elder Scam
-
Written by James Schmidt Editor’s Note: We often speak of online scams in
our blogs, ones that cost victims hundreds...
The post A Scam in the Family—Ho...
3 years ago
-
Symantec Identity: Stepping Up to Meet the COVID-19 Crisis
-
COVID-19 confronted healthcare providers and governments with unprecedented
requests for access, aid, and assistance. Here’s how one team at Symantec
is ri...
5 years ago
-
Getting DNS Client Cached Entries with CIM/WMI
-
What is DNS Cache The DNS cache maintains a database of recent DNS
resolution in memory. This allows for faster resolution of hosts that have
been queried ...
6 years ago
-
How Reverse Engineering (and Cyber-Criminals’ Mistakes) Can Help You When
You’ve Been a Ransomware Victim
-
Ransomware is a type of malware that threatens to publish the victim’s data
or perpetually block access to it unless a ransom is paid. In the last two
year...
6 years ago
-
-
Random CSO Musing
-
One of the biggest challenges of running a security organization is
balancing the ongoing efforts, with strategic directions, all while keeping
the “pressu...
7 years ago
-
Lucky Break
-
One of the things I do from time to time is throw out an open ended
question on Twitter. Sometimes I’m making a point, sometimes I just want
to amuse myse...
7 years ago
-
Indonesian Spam Communities
-
In our last post we tried to shed some light at what seemed to appear as a
very common PayPal phishing email at first glance, but evidently turned out
to b...
7 years ago
-
TekThing 161 – Bitcoin Sucks For Gaming PCs!!! Our Video Gear, Fingbox Home
Network Security
-
—— Thank You Patrons! Without your support via patreon.com/tekthing, we
wouldn’t be able to make the show for you every week!
https://www.patreon.com/tekth...
8 years ago
-
Romania is vice-champion at the European Cyber Security
-
CERT-RO The National Response Center for Cyber Security Incidents affirmed
on Friday that Romania, for the second consecutive year, has become the
European...
8 years ago
-
CoalaBot : http Ddos Bot
-
CoalaBot appears to be build on August Stealer code (Panel and Traffic are
really alike)
I found it spread as a tasks in a Betabot and in an Andromeda sp...
8 years ago
-
Social-Engineer Toolkit (SET) v7.7 “Blackout” Released
-
TrustedSec is proud to announce a major release of the Social-Engineer
Toolkit (SET) v7.7. This version incorporates support for hostnames in the
HTA att...
8 years ago
-
Big Changes Around the Corner for the IoT
-
The IoT is transforming before our eyes due to increasing regulations,
growing demand for security standards and advancements in the telecom
industry.
T...
8 years ago
-
ClearEnergy ransomware can destroy process automation logics in critical
infrastructure, SCADA and industrial control systems.
-
Schneider Electric, Allen-Bradley, General Electric (GE) and more vendors
are vulnerable to ClearEnergy ransomware. Researchers at CRITIFENCE®
Critical I...
8 years ago
-
ROOTCON 10 Capture The Flag Statistics
-
During ROOTCON 10, we introduced a new dedicated track for our Capture The
Flag, with the comfortable CTF tables and chairs the game was well
participated ...
9 years ago
-
拽讬专 讛讘讜砖讛: 诪讞爪讬转 专讗砖讜谞讛 砖诇 砖谞转 2016 - 诪讙诪讜转 讘驻讙讬注讛 讘诪讬讚注 专驻讜讗讬 讘讗专讛"讘
-
转专讙讜诐 诪讗诪专 :
http://www.healthcareinfosecurity.com/wall-shame-mid-year-2016-breach-trends-a-9245
砖谞讬 讚讘专讬诐 砖讗谞讬, 讬讗讬专, 诇讜拽讞 诪讛诪讗诪专 讛讝讛 讻诇拽讞讬诐 谞讻讜谉 诇讛讬讜诐:1....
9 years ago
-
The ‘Compliance Only / CISSP / Minimum Viable Product / HR firewall’
infosec trapezoid of fuck
-
Yesterday (thurs, 3/24/16) I went on a tirade on twitter, regarding an
experience I had in San Francisco during RSA week, while at a vendor party.
I’ll let...
9 years ago
-
Dridex Down Under
-
Raytheon | Websense® Security Labs™ has been tracking malicious email
campaigns associated with the Dridex banking Trojan since 2014. An
interesting deve...
10 years ago
-
[Updated] Nurturing JavaScript Obfuscation and Fast Flux DNS - "Whats App
Voicemail Spamming" for Russian Online Pharmacies!
-
Recently, we analyzed that spammers are doing "Whats App Fake Voicemail"
spamming to trick end-users to visit online pharmacies' websites. There are
high...
10 years ago
-
What Verizon Missed in the Latest Threat Reports
-
* By: Zuk Avraham, Joshua Drake, Yaniv Karta, Jimmy Sha *
* Read the full report - here Recently, Veriz...
10 years ago
-
Forensic
-
讗讞转 诪讛讘注讬讜转 讛注讬拽专讬讜转 讘讘讬爪讜注 转讛诇讬讱 FORENSIC 讛讜讗 诇讗讞专 讘讬爪讜注 转讛诇讬讱 砖讬讻驻讜诇 讛 -
Harddisk (注诇 驻讬 讻诇 讛转拽谞讬诐 砖诇 砖讬讻驻讜诇 讘讬讟 讗讞专讬 讘讬讟), 讛讬讗 诇讘爪注 诪讞拽专 注诇 *诪讞砖讘
讞讬...
10 years ago
-
Blog Moved
-
Please see the Trustwave SpiderLabs Blog.
10 years ago
-
TrustKeeper Scan Engine Update – February 4, 2015
-
The latest update to the TrustKeeper scan engine that powers our Trustwave
Vulnerability Management product (including both internal and external
vulnerabi...
11 years ago
-
RSA Announces End of RSA Security Conference
-
Aims to bring clarity to cloudy marketing messages through exhibit hall
chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of
EMC, today ...
11 years ago
-
botCloud – an emerging platform for cyber-attacks
-
Hosting network services on Cloud platforms is getting more and more
popular. It is not in the scope of this article to elaborate the advantage
of using Cl...
13 years ago
-
mimikatz: Tool To Recover Cleartext Passwords From Lsass
-
I meant to blog about this a while ago, but never got round to it. Here’s a
brief post about very cool feature of a tool called mimikatz. I’m very
grateful...
14 years ago
-
Pentestify.
-
i’m over here now.
14 years ago
-
-
-
-
-
-
-
-
-
Hacking Illustrated videos from the "irongeek"
www.irongeek.com is one of the best site for watching "how to" hacking video's
here are some of the video topics:
Intro to the AirPcap USB adapter, Wireshark, and using Cain to crack WEP
UPnP Port Forwarding and Security
Remote Access And Configuration: Setting Up SSH and VNC On Ubuntu Linux
WEP Cracking with VMplayer, BackTrack, Aircrack and the DLink DWL-G122 USB Adapter
An Introduction to Tor var
Cracking Windows Vista Passwords With Ophcrack And Cain
Installing Updates And New Software In Ubuntu Linux Installing Ubuntu Linux
Using SysInternals’ Process Monitor to Analyze Apps and Malware
Dual Booting BackTack Linux And BartPE From A Thumbdrive
Creating a Windows Live CD for System Recovery and Pen-Testing with Bart's PE Builder
Making Windows Trojans with EXE Binders (AKA:Joiners), Splice and IExpress A
Hosts File and Ad Blocking
Passive OS Fingerprinting With P0f And Ettercap
Cracking MD5 Password Hashes
Setting Firefox's User Agent To Googlebot
Using TrueCrypt With NTFS Alternate Data Streams
Intro To TrueCrypt
Intro To DD and Autopsy By Williamc and Twinvega
Intro To Bluesnarfing By Williamc and Twinvega
Network Printer Hacking: Irongeek's Presentation at Notacon
Irongeek's Guide to Buying a Used Laptop
Cracking Windows Passwords with BackTrack and the Online Rainbow Tables at Plain-Text.info
Adding Modules to a Slax or Backtrack Live CD from Windows
Anonym.OS: LiveCD with build in Tor Onion routing and Privoxy
Make your own VMs with hard drive for free: VMware Player + VMX Builder Using VMware Player to run Live CDs (Bootable ISOs)
SSH Dynamic Port Forwarding