Oct 06, 2025Ravie LakshmananNetwork Security / Cyber Espionage A Chinese company named the Beijing…
Cyber News
-
-
Vulnerability
Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks
by adminby adminOct 06, 2025Ravie LakshmananVulnerability / Threat Intelligence Oracle has released an emergency update to…
-
Cyber Attacks
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations
by adminby adminThreat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software…
-
SecuritySecurity Tools
MemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory
by adminby adminMemGuard- Secure Software Enclave For Storage of Sensitive Information in Memory This package attempts…
-
SecuritySecurity Tools
USBRIP- Simple Command Live Forensic Tool For Tracking USB device
by adminby adminSimple command line forensics tool for tracking USB device artifacts (history of USB events)…
-
SleuthQ- A Tool To Find SQL Injection Vulnerability Python3 Burp History parsing tool to…
-
Vulnerability
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
by adminby adminApr 25, 2024NewsroomVulnerability / Zero-Day A new malware campaign leveraged two zero-day flaws in…
-
This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is…
-
SecuritySecurity Tools
CloudCheck- To Test String If A Cloudflare DNS Bypass is Possible
by adminby adminCloudCheck- To Test String If A Cloudflare DNS Bypass is Possible Cloudcheck is made…
-
“Napper”- A Trusted Platform Module (TPM) Vulnerability Checker Tool TPM vulnerability checking tool for…