Austin, Texas, United States, 9th April 2026, CyberNewswire
Authentication Bypass Bug Found In AWS IAM Authenticator for Kubernetes
A severe security bug existed in the AWS IAM Authenticator for Kubernetes. Exploiting this vulnerability …
BLACKEYE is a LAN phishing tool that can clone more than 30 networks templates to…
Dnsx is a fast and multi-purpose DNS toolkit that allows you to run multiple probers…
Zeus scanner is an open source tool used for reconnaissance and vulnerability assessments of web…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Brutex is a shell based open source tool to make your work faster. It combines…
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
Wifiphisher is an open source framework that can be utilised for red team engagements for…
MassBleed is an open source tool used for scanning SSL vulnerabilities in web applications. The…
Salsa-tools is a collection of three tools programmed with C# used to take over a…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
Back again with more DNS enumeration tools. This one has been around for quite some…
Austin, Texas, United States, 9th April 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
In cybersecurity, search visibility is not just about traffic. It is about trust, accuracy, and …
A severe security bug existed in the AWS IAM Authenticator for Kubernetes. Exploiting this vulnerability …
Heads up, Lenovo users! Your laptop might just need a major update as Lenovo addressed …
