Credentials for 50 thousand Fortinet VPN devices published online
Last weekend, one of the hacker forums posted exploits for a vulnerability…
MobileIron: RCE flaw under attack
MobileIron - According to a new advisory, MobileIron's mobile device management security…
How To Use Powershell Empire
Initial setup Build a C2 server called listener ================================================================ Post-Exploitation Framework ================================================================…
Microsoft 365 adds new features to monitor employee activity
Microsoft has added new features to Office Suite 365 that enable organizations…
Telegram has implemented a panic button to block data leaks
Corpsoft24, a company specializing in the provision of cloud services, has developed…
Scan Open Ports With Nmap – Full Tutorial
1 What is nmap? Nmap, short for Network Mapper, is a free,…
Mitaka – Powerful OSINT Tool on Chrome
When trying to search the IOC (Indicator of Compromise) for IP addresses,…
Chinese hackers renewed spying on Vatican
Chinese cybercriminal group Mustang Panda (also known as TA416 and RedDelta) has…
CPanel 2FA can be bypassed
Security researchers of the information security company Digital Defense have discovered a…
Linux Trojan Stantinko Now Disguises As Apache Web Server
Operators of one of the oldest active botnets in existence today, Stantinko,…