Recent cybersecurity research has unveiled a critical vulnerability impacting over 1,450 pfSense servers, exposing them to potential remote code execution (RCE) attacks....
There is evidence that ChatGPT has helped low-skill hackers generate malware, which raises worries about the technology being abused by cybercriminals. ChatGPT...
The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in South and...
Web application firewalls, also known as WAFs, are intended to protect web-based applications and application programming interfaces (APIs) from malicious HTTPS traffic...
The following techniques have been made public by a researcher who wishes to remain anonymous. They can be used to bypass certain of...
Security researcher Rasmus Sten published a proof of concept (PoC) code to exploit a critical vulnerability in macOS Gatekeeper updated a few...
Researcher Haya Shulman of the Fraunhofer Institute for Secure Information Technology in Germany reported the discovery of a critical vulnerability in Let’s...
A group of specialists has detailed a method for abusing a well-known “H2C smuggling” technique in order to authenticate and bypass some...
Facial recognition systems are becoming more sophisticated. When we post a photo on Facebook accompanied by our closest friend, it is almost...
Researchers discovered new malicious Android apps from Google Play Store bypassing SMS-based two-factor authentication (2FA) mechanisms and steal the OTP without SMS’s...
Gmail, from Google, is one of the main services that use this login method Network security and ethical hacking specialists from the International...
There might be a time where you picked up an old laptop and had a bios password lock enabled but no clue...
Hackers are looking for ways to bypass this security measure The topic is being discussed in multiple hacking forums hosted on deep...
Cloudflare is a service that acts as a middleman between a website and its end users, protecting it from various attacks. Unfortunately,...
SpookFlare has a different perspective to bypass security measures and it gives you the opportunity to bypass the endpoint countermeasures at the...
A post-exploitation tool capable of maintaining persistence on a compromised machine, subverting many common host event logs (both network and account logon)...
Microsoft’s Antimalware Scan Interface (AMSI) was introduced in Windows 10 as a standard interface that provides the ability for AV engines to...
BGinfo.exe older than version 4.22 can be used to bypass application whitelisting using vbscript inside a bgi file. This can run directly...
This driver provides HDLC serial line discipline and comes as a kernel module in many Linux distributions, which have CONFIG_N_HDLC=m in the...
While doing some research on the inner workings of Microsofts new Antimalware Scan Interface technology within Windows 10, i found a DLL...
LastPass Password Manager – renowned for being a secure vault for user’s passwords, has recently demonstrated vulnerabilities that could expose many users’...