According to Google’s Project Zero team, threat actors exploited 0-day vulnerabilities to successfully carry out their attack. The IT security researchers at...
The undetected ElectroRat malware is capable of stealing private keys to access victims’ wallets and also run keylogger on a targeted device....
This is a tool that allows you to offensively use YARA to apply a filter to the events being reported by...
RogueWinRM is a local privilege escalation exploit that allows to escalate from a Service account (with SeImpersonatePrivilege) to Local System account...
Just a powershell scripts for auditing security with CIS BEST Practices Windows 10 and Window Server 2016 You just need to...
Google’s Project Zero team has made public details of an improperly patched zero-day security vulnerability in Windows print spooler API that could...
Are you ready for Windows 10X? Back in 2019, Mircosoft announced Windows 10X, an updated version of Windows for dual-screen devices. It...
PyMICROPSIA malware is developed to target Windows operating systems yet it checks for other operating systems, such as “darwin” or “POSIX.” In...
PYTMIPE (PYthon library for Token Manipulation and Impersonation for Privilege Escalation) is a Python 3 library for manipulating Windows tokens and...
Researchers uncovered a new Malvertising campaign PowerPepper from DeathStalker threat actor group that is active since 2012, and actively attacking various organizations...
Security researchers from an Austrian company have disclosed dome details about a severe vulnerability in Microsoft Autopilot, the tool for deploying devices...
2021 is shaping up to be a big year for Microsoft. As per reports, the tech giant is planning to bring Android...
wsb-detect enables you to detect if you are running in Windows Sandbox (“WSB”). The sandbox is used by Windows Defender for...
The innovative new Pluton security processor will amplify chip security and prevent hardware flaws like Spectre and Meltdown to steal sensitive data...
Encrypting a hard drive is a great way to protect a computer’s data. This will set a password each time a user...
Microsoft is the leading name in the PC game. When it comes to tabs and detachables, however, they don’t match up to...
Paradoxia Remote Access Tool. Features Paradoxia Console Feature Description Easy to use Paradoxia is extremely easy to use, So far...
In total, ethical hackers earned $1.2 million in the bug bounty competition. Bug bounty programs have to be one of the most...
Microsoft formally released fixes for 112 newly discovered security vulnerabilities as part of its November 2020 Patch Tuesday, including an actively exploited...
DeepBlueCLI – a PowerShell Module for Threat Hunting via Windows Event Logs Eric Conrad, Backshore Communications, LLC deepblue at backshore dot...
The high severity privilege escalation vulnerability tracked as CVE-2020-16877 affected Windows Server and Windows 10. IOActive cybersecurity researchers have disclosed a privilege...