Washington, DC, 4th February 2026, CyberNewsWire
New ERMAC 2.0 Trojan Variant Actively Targeting Android Users
Researchers have discovered a new malware variant of the Android banking trojan ERMAC, identified as …
The Evil Access Point (AP) attack has been around for a long time. There are…
What is GRR? This incident response framework is an open source tool used for live…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
The Operative Framework tool can be used within a red team/social engineering engagement to collect…
Cloakify Factory is a tool to transforms any file type into a list of harmless…
Net Creds is a free tool that sniffs passwords and hashes from a network interface.…
So what is this Lynis tool all about? Lynis is a security tool used for…
What is Infection Monkey? Infection Monkey is an open-source breach and attack simulation tool for…
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
We’re back again with another banger from Dan Miessler so if you liked the post…
MassExploitConsole is a python based easy-to-use cli tool for executing exploits. It has a collection…
Washington, DC, 4th February 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Securing a hybrid cloud environment can be complex. As workloads move to on-premises data centers …
Researchers have discovered a new malware variant of the Android banking trojan ERMAC, identified as …
Researchers have spotted a new browser hijacker in the wild, identified as “ChromeLoader” malware. This …
