Aggregator
hollows_hunter: Recognizes and dumps a variety of potentially malicious implants
hollows_hunter Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,
The post hollows_hunter: Recognizes and dumps a variety of potentially malicious implants appeared first on Penetration Testing Tools.
The AI Weak Link: How a Third-Party Breach Exposed Vercel Customer Secrets
The month of April concluded for the American firm Vercel with a distressing incident that precipitously transcended the
The post The AI Weak Link: How a Third-Party Breach Exposed Vercel Customer Secrets appeared first on Penetration Testing Tools.
The Invisible Workforce: How North Korea’s “NKITW” Program Infiltrates Western Tech Giants
North Korea, long regarded as the quintessential symbol of isolationism, has devised a sophisticated stratagem to permeate the
The post The Invisible Workforce: How North Korea’s “NKITW” Program Infiltrates Western Tech Giants appeared first on Penetration Testing Tools.
Shadow Nodes: Deciphering the Rise of Ashab al-Yamin in the European Cyber Landscape
The emergence of the nascent hacking collective Harakat Ashab al-Yamin al-Islamia has piqued the curiosity of security analysts
The post Shadow Nodes: Deciphering the Rise of Ashab al-Yamin in the European Cyber Landscape appeared first on Penetration Testing Tools.
The Assembly Line of Extortion: How Vect and TeamPCP Weaponized the Global Software Supply Chain
The cybercrime landscape has taken a definitive step toward “assembly-line” extortion. The Vect collective has established a dual
The post The Assembly Line of Extortion: How Vect and TeamPCP Weaponized the Global Software Supply Chain appeared first on Penetration Testing Tools.
Vercel Confirms Cyber Incident After Sophisticated Attacker Exploits Third‑Party Tool
The Invisible Storefront: How Obfuscated PHP Scripts Hijack Joomla Sites for SEO Spam
A website administrator utilizing the Joomla platform observed a perplexing phenomenon: myriad surreptitious links to third-party merchandise had
The post The Invisible Storefront: How Obfuscated PHP Scripts Hijack Joomla Sites for SEO Spam appeared first on Penetration Testing Tools.
鹰迅OCR:几十种功能集成工具,证件、发票、快递单、扫描件一键提取,省掉手动录入
美国空军部率先破解运营技术网络安全困局
防范超级AI风险:实测多天后,网安巨头Palo Alto推出企业网络防御应对指南
Almaty Takedown: The Inside Story of the International Sting That Toppled a Ransomware Kingpin
South Korean authorities, in concert with law enforcement in Kazakhstan, have apprehended the purported mastermind behind a series
The post Almaty Takedown: The Inside Story of the International Sting That Toppled a Ransomware Kingpin appeared first on Penetration Testing Tools.
AI安全跑出独角兽,长亭科技入选中国独角兽企业
NGate Android malware uses HandyPay NFC app to steal card data
The Human Aspect of Red Teams - Brian Fox, Tom Tovar, T. Gwyddon 'Data' Owen - ASW #379
Маркетплейсы — есть, микрочипы — нет. Депутат объяснил, на каком этапе Россия находится на пути к цифровому суверенитету
美国议员提新法案加强对华半导体出口管制
算力短缺和成本太高?GitHub宣布立即暂停新开通Copilot订阅且缩减权益
New NGate variant hides in a trojanized NFC payment app
New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses
Editor’s note: The research is authored by Mauro Eldritch, offensive security expert and a founder of BCA LTD, a company dedicated to threat intelligence and hunting. You can find Mauro on X. The recent wave of ClickFix attacks has introduced several new ways to compromise users, establishing itself as a technique that is likely here to stay. We have observed Lazarus Group using […]
The post New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses appeared first on ANY.RUN's Cybersecurity Blog.