Member News
GitTech (Use Caution)
GitHub - Porchetta-Industries/CrackMapExec: A swiss army knife for pentesting networks
A swiss army knife for pentesting networks. Contribute to Porchetta-Industries/CrackMapExec development by creating an account on GitHub. CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of "Living off the Land": abusing built-in Active Directory features/protocols to achieve it's functionality and allowing it to evade most endpoint protection/IDS/IPS solutions.
Cyber News
Microsoft Azure Services Flaws Could've Exposed Cloud Resources to Unauthorized Access
Researchers have discovered severe Server-Side Request Forgery (SSRF) vulnerabilities in 4 Microsoft Azure services.
Crypto-Exchange Used to Launder Ransomware Transactions Dismantled - Infosecurity Magazine
The US Justice Department arrested Russian national named Anatoly Legkodymov, the alleged owner of the China-based underground platform Bitzlato
PYTHON DEVELOPERS UNDER ATTACK. – CyberWorkx
Researchers from Checkpoint and Phylum had identified a new supply chain attack targetting to compromise python developers by making them download typosquatted python modules which contains malicious code in the intention of compromising the same.
Generating Hypotheses for Successful Threat Hunting | SANS Institute
Threat hunting is a proactive and iterative approach to detecting threats. Although threat hunters should rely heavily on automation and machine assistance, the process itself cannot be fully automated. One of the human's key contributions to a hunt is the formulation of a hypotheses to guide the.
Password managers: should you use them?
What's the point of password managers anyway? Let's take a look at what they do, how they work, and when you should use them.
PayPal Breach Exposed PII of Nearly 35K Accounts
The credential-stuffing attack, likely fueled by password reuse, yielded personal identifiable information that can be used to verify the authenticity of previously stolen data.