Swimlane introduces an OT security automation ecosystem

The launch of a security automation solution ecosystem for operational technology (OT) environments was announced on Monday by Swimlane, a provider of security orchestration, automation, and response (SOAR). For this OT security automation ecosystem, the business has partnered with a number of organizations, including the industrial cybersecurity firm Nozomi, the event monitoring and risk detection […]

7 high-severity vulnerabilities in Open Automation Software Platform, used for connectivity between PLCs and IoT devices

Cisco Talos researchers detected multiple critical vulnerabilities in Open Automation Software Platform, a solution powered by a universal data connector that allows data to be moved between programmable logic controllers (PLCs) from different vendors, from a PLC to a database, or from a database to visualization. Researcher Jared Rittle was responsible for identifying the flaws, […]

Three critical vulnerabilities in industrial automation products Honeywell Experion PKS and ACE Controllers allow hackers to shut down your manufacturing

Cybersecurity specialists report the detection of 3 vulnerabilities in various products of the technology firm Honeywell. According to the report, successful exploitation of these flaws would allow the deployment of denial of service (DoS) attacks and remote code execution. To be precise, the vulnerabilities reside in Experion Process Knowledge System (PKS), a well known process […]

10 Critical Flaws Found in CODESYS Industrial Automation Software

Cybersecurity researchers on Thursday disclosed as many as ten critical vulnerabilities impacting CODESYS automation software that could be exploited to remote code execution on programmable logic controllers (PLCs). “To exploit the vulnerabilities, an attacker does not need a username or password; having network access to the industrial controller is enough,” researchers from Positive Technologies said. […]

How Can Automation, AI, and ML Improve Cybersecurity?

When it comes to strengthening the current cybersecurity practices employed in organizations today, one of the most significant steps that security teams can take is to amalgamate modern technologies into an enterprise’s cybersecurity infrastructure. Typically, organizations tend to rely on technologies such as artificial intelligence and machine learning – both of which have taken the […]

Predator: Anti-Automation System

Predator – Anti-Automation System Predator is a prototype web application designed to demonstrate anti-crawling, anti-automation & bot detection techniques. It can be used as a honeypot, anti-crawling system or a false-positive testbed for vulnerability scanners. Warning: I strongly discourage the use of the demonstrated methods in a production server without knowing what they exactly do. Remember, […]

WinPwn – Automation For Internal Windows Penetrationtest / AD-Security

In many past internal penetration tests I often had problems with the existing Powershell Recon / Exploitation scripts due to missing proxy support. I often ran the same scripts one after the other to get information about the current system and/or the domain. To automate as many internal penetrationtest processes (reconnaissance as well as exploitation) […]

Leveraging Automation to Boost Your Cybersecurity

The growing variety and sophistication of cybersecurity threats have outpaced the development of conventional security tools. Apart from commoditized and automated hacking methods such as viruses, file-based malware, and botnets, advanced persistent threats (APTs) have also risen to become threats to anyone’s security. APTs are persistent malicious actors that attempt to gain access to infrastructure […]

How Cloud-Based Automation Can Keep Business Operations Secure

The massive data breach at Capital One – America’s seventh-largest bank, according to revenue – has challenged many common assumptions about cloud computing for the first time. Ironically, the incident, which exposed some 106 million Capital One customers’ accounts, has only reinforced the belief that the cloud remains the safest way to store sensitive data. […]

Endgame Red Team Automation (RTA) Framework

Red Team Automation (RTA) provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK. RTA is composed of python scripts that generate evidence of over 50 different ATT&CK tactics, as well as a compiled binary application that performs activities such as file timestopping, […]

EasySploit – Metasploit Automation (EASIER and FASTER than EVER)

EasySploit v3.1 (Linux) – Metasploit automation (EASIER and FASTER than EVER) Options: (1) Windows –> test.exe (payload and listener) (2) Android –> test.apk (payload and listener) (3) Linux –> test.py (payload and listener) (4) MacOS –> test.jar (payload and listener) (5) Web –> test.php (payload and listener) (6) Scan if a target is vulnerable to […]

Severe Flaw Disclosed In StackStorm DevOps Automation Software

A security researcher has discovered a severe vulnerability in the popular, open source event-driven platform StackStorm that could allow remote attackers to trick developers into unknowingly execute arbitrary commands on targeted services. StackStorm, aka “IFTTT for Ops,” is a powerful event-driven automation tool for integration and automation across services and tools that allows developers to […]

Brutex – Open Source Tool for Brute Force Automation

Brutex is a shell based open source tool to make your work faster. It combines the power of Nmap, Hydra and DNSenum. This tool will automatically run an nmap scan to your target and then it will brute force all the open services for you, such as FTP, SSH and more using Hydra. Installing Brutex […]

Laforge – Security Competition Infrastructure Automation Framework

Laforge enables rapid development of infrastructure for the purpose of information security competitions. Using a simple and intuitive configuration language, Laforge manages a dependency graph and state management and allows for highly productive remote collaboration. The Laforge engine uses a custom loader to do multi-dimensional, non-destructive configuration overlay. A good analogy to this is Docker […]

Whatsapp Automation for Sending and Receiving Messages

Whatsapp Automation is a collection of APIs that interact with WhatsApp messenger running in an Android emulator, allowing developers to build projects that automate sending and receiving messages, adding new contacts and broadcasting messages multiple contacts. The project uses Selinium, Appium, Python and Android Virtual Device Emulator. Demo Video.. Requirements: java Android Studio & Android […]

New security processes to prevent malicious automation on Twitter

Pentest specialists argue that social platforms can be a tool used for psychological warfare operations (PSYOPS) and malicious web campaigns, which is why Twitter has implemented new security features to identify and stop these abuses. Malicious agents set up bots to spread advertisements and links to dubious content websites, and social media platforms are dedicating significant efforts […]

Flaws in Siemens Building Automation Controllers open to hack. Fix them asap

Siemens has released a firmware update that addresses two vulnerabilities in its BACnet Field Panel building automation controllers. This week Siemens has released a firmware update for its BACnet Field Panel building automation products that solved two vulnerabilities, one of which is classified as high severity. The vulnerabilities affect APOGEE PXC and TALON TC BACnet […]

Glue – Application Security Automation

Glue is a framework for running a series of tools. Generally, it is intended as a backbone for automating a security analysis pipeline of tools. Dependencies clamav hashdeep rm (*nix) git mount (*nix) docker Download & Install gem install owasp-glue ordocker run owasp/glue Installation & run for Development purpose git clone https://github.com/owasp/glue cd glue — […]

5 Best Open Source Mobile Test Automation Tools

Short Bytes: There is a wide range of devices and platforms one needs to account for when developing a mobile app. An automation app for Mobile Testing can save development and testing time. Here are 5 top open source automated mobile testing frameworks to use, including the likes of Appium, Robotium, and Selendroid. Testing a software […]