cookie

Ми використовуємо файли cookie для покращення вашого досвіду перегляду. Натиснувши «Прийняти все», ви погоджуєтеся на використання файлів cookie.

avatar

Pentesting News

🥷🏼 → Cybersecurity → Pentesting → ReadTeam → OSINT → Offensive Security → Reverse → Malware Analisys 🎥 Video t.me/HackerVideos ❣️Donate t.me/PentestingNews/25159

Більше
Рекламні дописи
7 791
Підписники
+4324 години
+2857 днів
+1 34430 днів

Триває завантаження даних...

Приріст підписників

Триває завантаження даних...

What can we learn from the passwords used in brute-force attacks? https://blog.talosintelligence.com/threat-source-newsletter-may-2-2024/
Показати все...
What can we learn from the passwords used in brute-force attacks?

There are some classics on this list — the ever-present “Password” password, Passw0rd (with a zero, not an “O”) and “123456.”

Показати все...
Introducing Artifact Attestations–now in public beta

Generate and verify signed attestations for anything you make with GitHub Actions.

👍 1
LayerX Security Raises $24M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere https://cybersecuritynews.com/layerx-security-raises-24m-for-its-browser-security-platform/
Показати все...
LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely from Any Browser, Anywhere

“We’ve transformed workforce protection for organizations without requiring the transition to a dedicated secure browser.

Path Traversal Vulnerability In Popular Android Apps Let Attackers Overwrite Files https://cybersecuritynews.com/path-traversal-android-apps-vulnerability/
Показати все...
Path Traversal Vulnerability In Popular Android Apps Let Attackers Overwrite Files

The reason why hackers aim at well-known Android applications is that many people use them, and this means that when they attack it can impact

Cuttlefish 0-click Malware Hijacks Routers & Captures Data https://gbhackers.com/cuttlefish-malware-zero-click-data-capture/
Показати все...
Cuttlefish 0-click Malware Hijacks Routers & Captures Data

Cuttlefish is a new malware platform that has been identified to be active since at least July 2023.This malware platform specifically

ArcaneDoor Hackers Who Exploited Cisco Firewall Zero-Days Linked To China https://cybersecuritynews.com/arcanedoor-cisco-hackers-china/
Показати все...
ArcaneDoor Hackers Who Exploited Cisco Firewall Zero-Days Linked To China

Hackers target Cisco Firewalls due to their widespread use and the potential to exploit vulnerabilities to gain unauthorized access, steal

ArubaOS Critical Vulnerability Let Attackers Execute Remote Code https://gbhackers.com/arubaos-critical-vulnerability-remote-code-execution/
Показати все...
ArubaOS Critical Vulnerability Let Attackers Execute Remote Code

Multiple vulnerabilities have been discovered in ArubaOS that affects HPE Aruba Networking devices including Mobility Conductor,

CISA Warns Of Hackers Actively Attacking GitLab Password Reset Vulnerability https://cybersecuritynews.com/cisa-gitlab-password-reset-warning/
Показати все...
CISA Warns Of Hackers Actively Attacking GitLab Password Reset Vulnerability

Washington, D.C., May 1, 2024 – The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert concerning a newly

VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks https://gbhackers.com/vnc-cyber-attacks-remote-desktop-security/
Показати все...
VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

Remote desktop software, while facilitating remote work, presents security challenges for IT teams due to the use of various tools and ports

Показати все...
Threat actors hacked the Dropbox Sign production environment

Threat actors breached the Dropbox Sign production environment and accessed customer email addresses and hashed passwords