cookie

ما از کوکی‌ها برای بهبود تجربه مرور شما استفاده می‌کنیم. با کلیک کردن بر روی «پذیرش همه»، شما با استفاده از کوکی‌ها موافقت می‌کنید.

avatar

Pentesting News

🥷🏼 → Cybersecurity → Pentesting → ReadTeam → OSINT → Offensive Security → Reverse → Malware Analisys 🎥 Video t.me/HackerVideos ❣️Donate t.me/PentestingNews/25159

نمایش بیشتر
پست‌های تبلیغاتی
7 791
مشترکین
+4324 ساعت
+2857 روز
+1 34430 روز

در حال بارگیری داده...

معدل نمو المشتركين

در حال بارگیری داده...

What can we learn from the passwords used in brute-force attacks? https://blog.talosintelligence.com/threat-source-newsletter-may-2-2024/
نمایش همه...
What can we learn from the passwords used in brute-force attacks?

There are some classics on this list — the ever-present “Password” password, Passw0rd (with a zero, not an “O”) and “123456.”

LayerX Security Raises $24M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere https://cybersecuritynews.com/layerx-security-raises-24m-for-its-browser-security-platform/
نمایش همه...
LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere

“We’ve transformed workforce protection for organizations without requiring the transition to a dedicated secure browser.

Cuttlefish 0-click Malware Hijacks Routers & Captures Data https://gbhackers.com/cuttlefish-malware-zero-click-data-capture/
نمایش همه...
Cuttlefish 0-click Malware Hijacks Routers & Captures Data

Cuttlefish is a new malware platform that has been identified to be active since at least July 2023.This malware platform specifically

Path Traversal Vulnerability In Popular Android Apps Let Attackers Overwrite Files https://cybersecuritynews.com/path-traversal-android-apps-vulnerability/
نمایش همه...
Path Traversal Vulnerability In Popular Android Apps Let Attackers Overwrite Files

The reason why hackers aim at well-known Android applications is that many people use them, and this means that when they attack it can impact

نمایش همه...
Introducing Artifact Attestations–now in public beta

Generate and verify signed attestations for anything you make with GitHub Actions.

👍 1
ArubaOS Critical Vulnerability Let Attackers Execute Remote Code https://gbhackers.com/arubaos-critical-vulnerability-remote-code-execution/
نمایش همه...
ArubaOS Critical Vulnerability Let Attackers Execute Remote Code

Multiple vulnerabilities have been discovered in ArubaOS that affects HPE Aruba Networking devices including Mobility Conductor,

ArcaneDoor Hackers Who Exploited Cisco Firewall Zero-Days Linked To China https://cybersecuritynews.com/arcanedoor-cisco-hackers-china/
نمایش همه...
ArcaneDoor Hackers Who Exploited Cisco Firewall Zero-Days Linked To China

Hackers target Cisco Firewalls due to their widespread use and the potential to exploit vulnerabilities to gain unauthorized access, steal

CISA Warns Of Hackers Actively Attacking GitLab Password Reset Vulnerability https://cybersecuritynews.com/cisa-gitlab-password-reset-warning/
نمایش همه...
CISA Warns Of Hackers Actively Attacking GitLab Password Reset Vulnerability

Washington, D.C., May 1, 2024 – The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert concerning a newly

VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks https://gbhackers.com/vnc-cyber-attacks-remote-desktop-security/
نمایش همه...
VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

Remote desktop software, while facilitating remote work, presents security challenges for IT teams due to the use of various tools and ports

نمایش همه...
Threat actors hacked the Dropbox Sign production environment

Threat actors breached the Dropbox Sign production environment and accessed customer email addresses and hashed passwords