Cyber Security News
Embargo Ransomware Actors Abuses Safe Mode To Disable Security Solutions
In July 2024, the ransomware group Embargo targeted US companies using the malicious loader MDeployer and EDR killer MS4Killer.MDeployer deployed MS4Killer, which disabled security products, before executing the Embargo...
CVE/vulnerability
SMB Force-Authentication Vulnerability Impacts All OPA Versions For Windows
Open Policy Agent (OPA) recently patched a critical vulnerability that could have exposed NTLM credentials of the OPA server's local user account to remote...
Cyber Security News
Hackers Exploiting Selenium Grid Tool To Deploy Exploit Kit & Proxyjacker
Two campaigns targeting Selenium Grid's default lack of authentication are underway, as threat actors are exploiting this vulnerability to deploy malicious payloads, including exploit...
Cyber Crime
Threat Actors Exploiting Legitimate Software For Stealthy Cyber Attacks
CAMO, or Commercial Applications, Malicious Operations, highlights attackers' increasing reliance on legitimate IT tools to bypass security defenses, which can be used for various...
Cyber Attack
Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks
Hackers always keep updating their tools and add new ones to adapt to evolving security measures, bypass defenses, and exploit newly discovered vulnerabilities. Staying ahead...
Cyber Attack
TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs
Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making them easy to modify...
Exploitation Tools
EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using Firewall
Network Firewalls acts as a fortification to keep the internal corporate network secure. Many people often think as it is protecting a device from...
Exploitation Tools
Netcat vs Cryptcat – Remote Shell to Control Kali Linux from Windows machine
Netcat is a good build network debugging tool, which can read and write data across computers using TCP or UDP, it is also called...
Exploitation Tools
DNS Shell – Tool to Compromise and Maintain Control Over Victim Machine
DNS Shell protocol runs on the application layer of the TCP/IP Model. When an attacker or pentester tries to exploit DNS with RCE vulnerability (Remote Command Execution) destination...
Exploitation Tools
Commix – Automated All-in-One OS Command Injection and Exploitation Tool
Commix (short for and njection eploiter) has a simple environment and it can be used, by web developers, penetration testers, or even security researchers...
Exploitation Tools
BeEF – Browser Exploitation Framework Over WPN (Without Port Forwarding)
Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers.It helps a penetration tester to understand...