Austin, TX, USA, 19th March 2026, CyberNewswire
Konni RAT Malware Campaign Spreads Via Malicious Word Files
Researchers caught a new campaign from the notorious Konni RAT malware exploiting malicious Word files. …
Webvulnscan is a web application scanner that automates vulnerability assessment tasks. The tool can automatically…
Photon is a relatively fast crawler designed for automating OSINT (Open Source Intelligence) with a…
Dalfox is a fast, powerful parameter analysis and XSS scanner based on a DOM parser.…
So what is this phishing tool all about? Blackeye is tool scripted in shell to…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
XSStrike is an open source tool that detects Cross Site Scripting vulnerabilities and exploits them. …
Many times when you want to perform an exploitation to a windows target, you need…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
Trape is a tool written in python that can aid in tracking a client after…
What is Mip22? Mip22 is a modern and advanced cyber security program for use with…
Final Recon is a useful tool for gathering data about a target from open source…
Austin, TX, USA, 19th March 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
In cybersecurity, search visibility is not just about traffic. It is about trust, accuracy, and …
Researchers caught a new campaign from the notorious Konni RAT malware exploiting malicious Word files. …
Given the continuous rise in active exploitation of the now-known CitrixBleed flaw, governments issued new …
