Cary, North Carolina, USA, 18th December 2025, CyberNewsWire
Successful Phishing Campaign Targeted Colombian Government Agencies
Blind Eagle (APT-C-36) used RAT Imminent Monitor computers to upload malware and steal trade secrets …
SecLists is a pentesting tool used by security professionals around the globe, it contains various…
4CAN V2 is a Raspberry Pi project created by the Cisco team in order to…
Today, we talk about SSLyze. SSLyze is a Python tool that can analyze the SSL…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
XSStrike is an open source tool that detects Cross Site Scripting vulnerabilities and exploits them. …
Leviathan is an open source toolkit that can be used for auditing networks and web…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
cSploit is now considered EOL and is not being updated by the developers. Current version…
I found this one while doings some research on BadUSBs and thought it would be…
AutoRecon is an enumeration tool that performs automated enumeration with multi-threaded capabilities. It is purposely…
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
Webpwn3r is a powerful scanning tool, written in Python, to detect remote command execution vulnerabilities,…
Cary, North Carolina, USA, 18th December 2025, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
For Managed Service Providers (MSPs), minutes may even define success or failure. Many a time …
Blind Eagle (APT-C-36) used RAT Imminent Monitor computers to upload malware and steal trade secrets …
Both Cisco and Adobe have earlier this week released patches for vulnerabilities to their products …
