SINGAPORE, Singapore, 17th February 2026, CyberNewswire
RomCom Exploits Zero Days In Recent Backdoor Campaigns
The threat actor group RomCom have exploited two zero days in its recent backdoor campaigns. …
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Nuclei is a tool that is used to send requests across the given target based…
Spiderfoot is an open-source tool used for reconnaissance. It is capable of gathering open-source information…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
Cr3dOv3r is an open source tool that helps in finding credentials reuse attack for any…
SniffAir is an open source tool made for sophisticated wireless attacks and data capture, it…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
Final Recon is a useful tool for gathering data about a target from open source…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
Altair is a Python tool that can be used to scan for web related vulnerabilities,…
Reconnoitre is a tool that was created to automate routine actions within the OSCP lab…
SINGAPORE, Singapore, 17th February 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
The internet can be a scary place. Every day, I hear stories about people getting …
The threat actor group RomCom have exploited two zero days in its recent backdoor campaigns. …
As Microsoft manoeuvres to a safer, passwordless operational environment, Microsoft tests passkey support with Windows …
