Washington, DC, 4th February 2026, CyberNewsWire
CVSS 4.0 Arrived As The New Vulnerability Scoring Standard
After announcing the upgradation of the CVSS 3.0 scoring system in June, this week, FIRST …
What is Azurite? This one’s a doozy folks. With the rapid growth of cloud infrastructure…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy…
Recon-ng is a reconnaissance framework that can perform open source web based information gathering for…
I found this one while doings some research on BadUSBs and thought it would be…
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker…
Turbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based…
What Is Sparta? Sparta, created by SECFORCE is the ultimate tool for recon and network…
Today, we are going to talk about a powerful web application scanner named WAScan. WAScan…
Salsa-tools is a collection of three tools programmed with C# used to take over a…
Today I have a tool that exploits insecure file shares and allows penetration testers to…
Raccoon is an offensive security tool known for reconnaissance and information gathering. The tool can…
Washington, DC, 4th February 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
When organizations think about cybersecurity threats, attention often goes to external attackers. Yet a significant …
After announcing the upgradation of the CVSS 3.0 scoring system in June, this week, FIRST …
The Government of Canada officially bans using WeChat and Kaspersky apps on government devices, citing …
