ca Hashcat Advanced Password Recovery 4.1.0 Source Code By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 14:04:26 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
ca NTCrackPipe 1.0 Local Windows Account Cracker By packetstormsecurity.com Published On :: Fri, 23 Feb 2018 02:22:22 GMT NTCrackPipe is a basic local Windows account cracking tool. Full Article
ca Hashcat Advanced Password Recovery 4.2.0 Binary Release By packetstormsecurity.com Published On :: Fri, 03 Aug 2018 02:29:09 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
ca Hashcat Advanced Password Recovery 4.2.0 Source Code By packetstormsecurity.com Published On :: Fri, 03 Aug 2018 02:31:24 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
ca Hashcat Advanced Password Recovery 4.2.1 Binary Release By packetstormsecurity.com Published On :: Tue, 07 Aug 2018 23:55:55 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
ca Hashcat Advanced Password Recovery 4.2.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Aug 2018 23:56:22 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
ca Hashcat Advanced Password Recovery 5.0.0 Binary Release By packetstormsecurity.com Published On :: Mon, 29 Oct 2018 15:56:15 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
ca Hashcat Advanced Password Recovery 5.0.0 Source Code By packetstormsecurity.com Published On :: Mon, 29 Oct 2018 15:56:21 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
ca Hashcat Advanced Password Recovery 5.1.0 Binary Release By packetstormsecurity.com Published On :: Tue, 04 Dec 2018 05:06:24 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
ca Hashcat Advanced Password Recovery 5.1.0 Source Code By packetstormsecurity.com Published On :: Tue, 04 Dec 2018 05:06:30 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
ca Gadgets Can Be Hacked To Produce Dangerous Sounds By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 18:14:53 GMT Full Article headline flaw cyberwar science conference
ca Amazon's Rekognition Software Can Now Spot Fear By packetstormsecurity.com Published On :: Thu, 15 Aug 2019 16:15:39 GMT Full Article headline amazon science
ca First Clinical Trial Of Gene Editing To Help Target Cancer By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 13:39:23 GMT Full Article headline science
ca AI Cannot Be Recognized As An Inventor, US Rules By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:28:43 GMT Full Article headline government usa science
ca OpenBSD - Call For Donations By packetstormsecurity.com Published On :: Sat, 28 Feb 2009 22:16:54 GMT Full Article bsd
ca FreeBSD Bug Grants Local Root Access By packetstormsecurity.com Published On :: Mon, 14 Sep 2009 02:07:55 GMT Full Article bsd
ca Critical FreeBSD Bug Squashed By packetstormsecurity.com Published On :: Fri, 18 Mar 2016 15:38:27 GMT Full Article headline flaw bsd
ca OpenBSD Patches Auth Bypass, Privilege Escalation Vulns By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 16:54:00 GMT Full Article headline flaw bsd patch
ca Australian MPs Call On UK To Block US Assange Extradition By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 14:57:28 GMT Full Article headline government usa britain australia data loss cyberwar spyware
ca Loyalty Cards Targeted In Tesco Clubcard Attack By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 14:35:27 GMT Full Article headline hacker britain data loss fraud
ca UK Privacy Advocates Warn Over COVID-19 Contact Tracing App By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:42 GMT Full Article headline government privacy virus phone britain
ca SIM Card Hack Suspect Released On Bail By packetstormsecurity.com Published On :: Fri, 25 Sep 2009 22:21:46 GMT Full Article scam caribbean
ca German Police Handed Hacking Powers To Bypass Encrypted Communications By packetstormsecurity.com Published On :: Sat, 24 Jun 2017 16:49:10 GMT Full Article headline government privacy phone germany spyware backdoor cryptography
ca German e-Gov Protocol Carries Ancient Vulns By packetstormsecurity.com Published On :: Mon, 03 Jul 2017 15:44:14 GMT Full Article headline government flaw germany
ca German Cartel Office To Take Facebook Case To Highest Court By packetstormsecurity.com Published On :: Tue, 27 Aug 2019 13:25:48 GMT Full Article headline government privacy data loss fraud germany identity theft facebook
ca Switzerland Files Criminal Complaint Over Crypto Spying Scandal By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:28 GMT Full Article headline government privacy cyberwar germany spyware cryptography switzerland cia
ca How Does IS Communicate Securely? By packetstormsecurity.com Published On :: Tue, 17 Nov 2015 16:53:15 GMT Full Article headline government spyware france terror cryptography
ca Russian Hackers Target French Presidential Candidate By packetstormsecurity.com Published On :: Tue, 25 Apr 2017 14:00:53 GMT Full Article headline hacker government russia fraud cyberwar france
ca Avast Anti-Virus Local Credential Disclosure By packetstormsecurity.com Published On :: Sun, 10 Feb 2019 13:22:22 GMT Avast Anti-Virus versions prior to 19.1.2360 suffer from a local credential disclosure vulnerability. Full Article
ca iOS Application (In)Security By packetstormsecurity.com Published On :: Sun, 06 May 2012 01:48:08 GMT This whitepaper details some of the vulnerabilities observed over the past year while performing regular security assessments of iPhone and iPad applications. MDSec documents some of the vulnerabilities identified as well as the methods to exploit them, and recommendations that developers can adopt to protect their iOS applications. It covers not only the security features of the platform, but provides in depth information on how to perform both black box and white box iOS penetration tests, along with suggested methodologies and compliance. Full Article
ca Texas School District Falls For Email Scam, Hands Over $2.3 Million By packetstormsecurity.com Published On :: Mon, 13 Jan 2020 15:34:23 GMT Full Article headline government email bank usa cybercrime fraud
ca OpenSMTPD 6.6.1 Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:51:04 GMT smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell meta-characters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. Full Article
ca Cacti 1.2.8 Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:42:06 GMT graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie if a guest user has the graph real-time privilege. Full Article
ca Centreon Poller Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:30:58 GMT This Metasploit module exploits a flaw where an authenticated user with sufficient administrative rights to manage pollers can use this functionality to execute arbitrary commands remotely. Usually, the miscellaneous commands are used by the additional modules (to perform certain actions), by the scheduler for data processing, etc. This module uses this functionality to obtain a remote shell on the target. Full Article
ca TP-LINK Cloud Cameras NCXXX Bonjour Command Injection By packetstormsecurity.com Published On :: Fri, 01 May 2020 22:22:22 GMT TP-LINK Cloud Cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a command injection vulnerability. The issue is located in the swSystemSetProductAliasCheck method of the ipcamera binary (Called when setting a new alias for the device via /setsysname.fcgi), where despite a check on the name length, no other checks are in place in order to prevent shell metacharacters from being introduced. The system name would then be used in swBonjourStartHTTP as part of a shell command where arbitrary commands could be injected and executed as root. Full Article
ca American Cities of the Future 2019/20 - the winners By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:24:30 +0000 New York continues to reign as leader of fDi’s American Cities of the Future 2019/20 ranking. San Francisco retains second place with Toronto rising to third. Naomi Davies reports. Full Article
ca American Cities of the Future 2019/20 – FDI strategy By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:25:52 +0000 A more detailed look at fDi's judges’ top five American Cities of the Future 2019/20 for FDI strategy. Naomi Davies reports. Full Article
ca Fintech Locations of the Future 2019/20: London tops first ranking By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:49 +0000 London has been named fDi’s inaugural Fintech Location of the Future for 2019/20, followed by Singapore and Belfast. Full Article
ca Tourism Locations of the Future 2019/20 – FDI Strategy By www.fdiintelligence.com Published On :: Mon, 09 Dec 2019 08:33:03 +0000 Australia tops the FDI Strategy category of fDi's Tourism Locations of the Future 2019/20 rankings, followed by Costa Rica and Azerbaijan. Full Article
ca Linux Kernel Spectre V2 Defense Caused Massive Slowdown By packetstormsecurity.com Published On :: Tue, 20 Nov 2018 15:06:31 GMT Full Article headline linux flaw patch intel
ca Container Escape Hack Targets Vulnerable Linux Kernel By packetstormsecurity.com Published On :: Mon, 04 Mar 2019 15:36:46 GMT Full Article headline linux flaw
ca Linux Backdoor Found In The Wild Escaped AV Detection By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:40 GMT Full Article headline malware linux virus backdoor
ca Canonical GitHub Account Hacked, Ubuntu Source Code Safe By packetstormsecurity.com Published On :: Sun, 07 Jul 2019 14:21:40 GMT Full Article headline hacker linux
ca Critical Linux Wi-Fi Bug Allows System Compromise By packetstormsecurity.com Published On :: Sat, 19 Oct 2019 15:36:59 GMT Full Article headline linux wireless flaw
ca Bluelog Bluetooth Scanner/Logger 1.1.1 By packetstormsecurity.com Published On :: Mon, 01 Apr 2013 20:22:22 GMT Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice. Full Article
ca Bluelog Bluetooth Scanner/Logger 1.1.2 By packetstormsecurity.com Published On :: Mon, 04 Nov 2013 23:40:27 GMT Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice. Full Article
ca DAWIN - Distributed Audit and Wireless Intrustion Notification By packetstormsecurity.com Published On :: Wed, 17 Sep 2014 22:34:16 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
ca DAWIN - Distributed Audit and Wireless Intrustion Notification 2.0 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 00:52:43 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
ca man-cgi Local File Inclusion By packetstormsecurity.com Published On :: Wed, 08 Aug 2018 01:11:11 GMT man-cgi versions prior to 1.16 suffer from a local file inclusion vulnerability. Full Article
ca Teltonika RUT9XX Unauthenticated OS Command Injection By packetstormsecurity.com Published On :: Fri, 12 Oct 2018 16:16:15 GMT Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges. Full Article