Browsing tag

cybersecurity

California Department of Motor Vehicles exposes drivers’ personal information

According to information security specialists, the California Department of Motor Vehicles (DMV) suffered a data breach that exposed the Social Security numbers of thousands of city drivers; the incident would have given other government agencies undue access to this information. This incident is particularly serious for illegal migrants residing in the state, as the leaked […]

Ransomware attack infects 30,000 computers in New Mexico schools

A serious incident has compromised the computer systems of a US school district. According to digital forensics specialists, a ransomware attack has infected about 30,000 computers belonging to the Las Cruces school district, New Mexico, US. The incident caused servers and Internet devices to shut down throughout the district. During a press conference, Superintendent Karen […]

Sojobo – A Binary Analysis Framework

Sojobo is an emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It is totally developed in .NET so you don’t need to install or compile any other external libraries (the project is self contained).With Sojobo you can: Emulate a (32 bit) PE binary Inspect the memory of […]

Sparrow-Wifi – Next-Gen GUI-based WiFi And Bluetooth Analyzer For Linux

Sparrow-wifi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz Wifi spectral awareness tool. At its most basic it provides a more comprehensive GUI-based replacement for tools like inSSIDer and linssid that runs specifically on linux. In its most comprehensive use cases, sparrow-wifi integrates wifi, software-defined radio […]

Donut – Generates X86, X64, Or AMD64+x86 Position-Independent Shellcode That Loads .NET Assemblies, PE Files, And Other Windows Payloads From Memory

Donut generates x86 or x64 shellcode from VBScript, JScript, EXE, DLL (including .NET Assemblies) files. This shellcode can be injected into an arbitrary Windows processes for in-memory execution. Given a supported file type, parameters and an entry point where applicable (such as Program.Main), it produces position-independent shellcode that loads and runs entirely from memory. A […]

TrendMicro antivirus customers’ information was leaked and sold to online scammers

We must not forget that even specialized companies can suffer cybersecurity incidents. According to digital forensics experts, an employee of Japan-based security firm TrendMicro was discovered stealing information from the company’s customers and selling it to third parties aiming to deploy sophisticated tech support scam campaigns. The targets of this campaign were the company’s customers […]

Data breaches could increase the price of a company’s shares. The reason why companies don’t fix their security

Data breach incidents can be catastrophic for any organization, resulting in large fines, loss of user or customer trust, and public image damage. However, a recent research conducted by information security specialists has found that these incidents could in fact be beneficial for some companies. As you may recall, a data breach involves unauthorized access […]

Github-Dorks – Collection Of Github Dorks And Helper Tool To Automate The Process Of Checking Dorks

Github search is quite powerful and useful feature and can be used to search sensitive data on the repositories. Collection of github dorks that can reveal sensitive personal and/or organizational information such as private keys, credentials, authentication tokens, etc. This list is supposed to be useful for assessing security and performing pen-testing of systems. GitHub […]

Marriott hotel chain employee data leak. Why do companies allow this to happen?

Marriott International hotel chain has alerted its associates about a cyber security incident that could negatively impact the security of some associate’s data (specifically their social security numbers), after an unidentified threat actor accessed network of an outside vendor formerly used by Marriott, data protection experts reported. This incident did not involve or impact the […]

HomePwn – Swiss Army Knife for Pentesting of IoT Devices

HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day work and inside the same working environment. It is designed to find devices in the home or office, take advantage of certain vulnerabilities to read or send data to those devices. With a strong library […]

A serious ransomware attack shuts down operations in Canadian region Nunavut

Ransomware remains one of the main cybersecurity threats for any individual or company. Vulnerability testing specialists report a serious ransomware infection that has crippled all computer operations in Nunavut, a remote Canadian territory. In a statement, the local government said, “All government services that depend on access to digital resources have been affected by a […]

Download this Paradise ransomware decryption tool and save your files

A team of ethical hacking specialists has developed a free tool to remove the encryption implemented by the ransomware variant known as Paradise, which provides victims of this infection an option to regain access to their encrypted files without having to negotiate with threat actors. Paradise ransomware has been active at least since September 2017 […]

Gmail is the most secure email service. What about the most insecure? It’s AOL. Full list of email services most exposed to hackers

Unfortunately, data breaches are very common incidents today, with email addresses being one of the most exposed data in these cases. In this regard, information security experts, in collaboration with the firm Who Is Hosting This, conducted a study to find the most secure email services, as well as those most exposed to hackers. One […]

Spain under massive ransomware attack; multiple companies affected

Digital forensics specialists reported a massive ransomware campaign that has infected the networks of some major companies in Spain, including broadcaster Cadena SER and consulting firm Everis. According to reports, the attacks have been serious enough to deeply affect operations in both organizations, which report multiple outages and system failures. Failures in the broadcaster’s IT […]