■■■■■ Tool Release – HTTPSignatures: A Burp Suite Extension Implementing HTTP Signatures. https://research.nccgroup.com/2020/12/08/tool-release-httpsignatures-a-burp-suite-extension-implementing-http-signatures/amp/ https://t.me/cKure/6304
All posts tagged news
December 10, 2020 at 01:37AM
■■■□□ CVE-2020-17049: Kerberos Bronze Bit Attack – Overview https://blog.netspi.com/cve-2020-17049-kerberos-bronze-bit-overview/ https://t.me/cKure/6303
December 10, 2020 at 01:32AM
■□□□□ Hackers demand $34.7 million in Bitcoin after ransomware attack on Foxconn. https://portswigger.net/daily-swig/hackers-demand-34-7-million-in-bitcoin-after-ransomware-attack-on-foxconn https://t.me/cKure/6302
December 10, 2020 at 01:25AM
■■□□□ #Privacy: Vulnerabilities Found in Multiple GE Imaging Systems. https://www.infosecurity-magazine.com:443/news/vulnerabilities-ge-imaging-systems/ https://t.me/cKure/6298
December 9, 2020 at 11:38PM
■□□□□ #DataLeak: Actor named Jack Daniel selling data of a company from #UnitedStates and various of its allies. https://t.me/cKure/6291
December 9, 2020 at 11:27PM
■□□□□ Huawei HedEx Lite 200R006C00SPC005 – Path Traversal | remote exploit https://www.exploit-db.com/exploits/49218 https://t.me/cKure/6289
December 9, 2020 at 08:00PM
■□□□□ GitHub offers tighter integration of security to development workflows. https://portswigger.net/daily-swig/github-offers-tighter-integration-of-security-to-development-workflows https://t.me/cKure/6288
December 9, 2020 at 04:14PM
■■■□□ #DataLeak: Actor claiming to have SQLi exploit on subsisting of Gucci and Chanel. Ref: 1. https://en.wikipedia.org/wiki/Gucci 2. https://en.wikipedia.org/wiki/Chanel I’m selling both for 260$. Gucci: 130$ Chanel: 130$ https://t.me/cKure/6287
December 9, 2020 at 03:56PM
■■■□□ The FireEye #DataLeak attack has been credit to #Russia based hackers. https://t.me/cKure/6286
December 9, 2020 at 11:38AM
■■■■■ #DataLeak of Hacking utilities at FireEye A highly sophisticated state-sponsored adversary stole FireEye Red Team tools. Because we believe that an adversary possesses these tools, and we do not know whether the attacker intends to use the stolen tools themselves or publicly disclose them, FireEye is releasing hundreds of countermeasures with this blog post…
