Washington, DC, 4th February 2026, CyberNewsWire
Serious 2FA Bypass Vulnerability Affected Facebook And Instagram
A researcher won a hefty bounty for reporting a severe two-factor authentication (2FA) bypass bug …
Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers.…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
KillShot is a penetration testing tool that can be used to gather useful information and…
RapidScan is a python based scanning tool used for analyzing vulnerabilities in web applications. The…
Cr3dOv3r is an open source tool that helps in finding credentials reuse attack for any…
PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
Tulpar is an open source penetration testing tool that can find web application vulnerabilities such…
Nmap Automator is a great tool for initial port scans of a given ip address.…
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
PhishX is a python tool that can capture user credentials using a spear phishing attack.…
Leviathan is an open source toolkit that can be used for auditing networks and web…
Washington, DC, 4th February 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
When organizations think about cybersecurity threats, attention often goes to external attackers. Yet a significant …
A researcher won a hefty bounty for reporting a severe two-factor authentication (2FA) bypass bug …
Researchers discovered numerous vulnerabilities in the Yellowfin BI platform that could allow remote code execution …
