to Magecart Group Linked To Dridex Banking Trojan, Carbanak By packetstormsecurity.com Published On :: Tue, 22 Oct 2019 17:10:02 GMT Full Article headline hacker malware bank trojan cybercrime fraud
to JhoneRAT Exploits Cloud To Attack Middle Eastern Countries By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:27:18 GMT Full Article headline malware trojan cyberwar
to TrickBot Switches To A New Win10 UAC Bypass To Evade Detection By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 15:59:32 GMT Full Article headline malware microsoft trojan fraud flaw
to Emotet Trojan Evolves To Spread Via A WiFi Connection By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:34:01 GMT Full Article headline malware trojan wireless
to US Says It Can Prove Huawei Has Backdoor Access To Mobile Phone Networks By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:47 GMT Full Article headline government usa phone china cyberwar backdoor
to FSB Contractor Breach Exposes Secret Cyber Weapons Program By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 14:15:28 GMT Full Article headline government russia cyberwar
to DarkHotel Hackers Use VPN Zero-Day To Breach Chinese Government Agencies By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:18:05 GMT Full Article headline hacker government malware virus china cyberwar
to Israel Government Tells Water Treatment Companies To Change Passwords By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:34:10 GMT Full Article headline malware cyberwar israel scada
to Phishing Campaign Leads To UPS Store Data Breach By packetstormsecurity.com Published On :: Thu, 23 Jan 2020 16:22:26 GMT Full Article headline hacker privacy data loss phish
to SIM Swappers Are Phishing Telco Employees To Get Access By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:10 GMT Full Article headline privacy phone cybercrime fraud phish
to Charming Kitten Uses Fake Interview Requests To Target Public Figures By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:27:44 GMT Full Article headline cybercrime fraud phish
to U.S. Finance Sector Hit With Targeted Backdoor Campaign By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 13:39:27 GMT Full Article headline hacker malware bank phish
to Hacker Scheme Threatens AdSense Customers By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:00:49 GMT Full Article headline hacker google phish
to Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework By packetstormsecurity.com Published On :: Tue, 24 Apr 2018 23:51:18 GMT Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework. Full Article
to ISO-8385 Protocol Fuzzer By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:22:40 GMT This python script is a fuzzer for the ISO-8385 financial protocol. It is compatible with sulley and bofuzz and is now part of the official bofuzz release. Full Article
to Probe Into Hacker Attack On FG Website By packetstormsecurity.com Published On :: Mon, 10 Jan 2011 16:30:35 GMT Full Article headline hacker ireland
to Windows Scammers Threaten To Blow Up Irish Garda Station By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 21:20:49 GMT Full Article headline microsoft scam ireland terror
to Facebook Updates Data Use Policy To Appease Irish Government By packetstormsecurity.com Published On :: Mon, 14 May 2012 15:19:22 GMT Full Article headline government privacy facebook social ireland
to First Irish-Speaking Virus Holds Bloke's Computer To Ransom By packetstormsecurity.com Published On :: Sat, 08 Sep 2012 00:36:18 GMT Full Article headline malware virus cybercrime fraud ireland
to Facebook Suspends Photo Tag Tool In Europe By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 00:46:43 GMT Full Article headline privacy facebook ireland
to Microsoft Fights US Warrant For Customer Data Stored Overseas By packetstormsecurity.com Published On :: Wed, 11 Jun 2014 23:49:27 GMT Full Article headline government privacy microsoft usa ireland
to Microsoft Refuses To Hand Over Foreign Data, Held In Contempt Of Court By packetstormsecurity.com Published On :: Fri, 12 Sep 2014 23:17:13 GMT Full Article headline government privacy microsoft usa data loss spyware ireland
to Irish Data Watchdog Is Probing Facebook Transfers To US By packetstormsecurity.com Published On :: Tue, 20 Oct 2015 15:43:57 GMT Full Article headline government privacy usa data loss facebook social ireland
to US Government To Defend Surveillance Activities In Irish Courts By packetstormsecurity.com Published On :: Mon, 13 Jun 2016 15:11:00 GMT Full Article headline government privacy usa facebook ireland
to Facebook Data Transfers To Be Examined By EU Court By packetstormsecurity.com Published On :: Thu, 12 Apr 2018 15:51:48 GMT Full Article headline government facebook social ireland
to Irish Supreme Court Rejects Facebook Bid To Block ECJ Data Case By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:52 GMT Full Article headline government privacy data loss facebook ireland
to Pwn2Own Tokyo 2019 Victimize Sony, Samsung, And Amazon Devices By packetstormsecurity.com Published On :: Mon, 11 Nov 2019 15:12:06 GMT Full Article headline hacker amazon flaw sony conference japan samsung
to Australia Makes Pinkie-Promise To End Indonesia Spying By packetstormsecurity.com Published On :: Fri, 29 Aug 2014 15:36:15 GMT Full Article headline government australia spyware indonesia
to Chap Cuffed After Treating Commuters To Giant-Screen Smut By packetstormsecurity.com Published On :: Thu, 06 Oct 2016 14:05:33 GMT Full Article headline hacker indonesia
to On The Run In Cuba, McAfee Pushes Cryptocurrency By packetstormsecurity.com Published On :: Sun, 07 Jul 2019 14:24:03 GMT Full Article headline government usa cuba mcafee cryptography
to rdp2tcp Tunneling Tool 0.1 By packetstormsecurity.com Published On :: Mon, 10 Jan 2011 11:11:11 GMT rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several TCP ports forwarding over an already established rdesktop session. Full Article
to conntrack-tools Bash Completion 1.0 By packetstormsecurity.com Published On :: Mon, 18 Apr 2016 04:44:44 GMT This is bash programmable completion for the conntrack-tools from netfilter.org. The package contains completions for conntrack, conntrackd, and nfct. Full Article
to Raptor WAF 0.01 By packetstormsecurity.com Published On :: Tue, 31 May 2016 03:33:33 GMT Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals. Full Article
to Web-Based Firewall Logging Tool 1.1.0 By packetstormsecurity.com Published On :: Sat, 06 Aug 2016 18:50:51 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
to Raptor WAF 0.2 By packetstormsecurity.com Published On :: Tue, 09 Aug 2016 18:46:45 GMT Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals. Full Article
to Raptor WAF 0.3 By packetstormsecurity.com Published On :: Sat, 29 Oct 2016 17:32:22 GMT Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals. Full Article
to Raptor WAF 0.4 By packetstormsecurity.com Published On :: Wed, 07 Dec 2016 17:04:35 GMT Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals. Full Article
to Raptor WAF 0.5 By packetstormsecurity.com Published On :: Tue, 26 Jun 2018 23:49:12 GMT Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals. Full Article
to Web-Based Firewall Logging Tool 1.1.1 By packetstormsecurity.com Published On :: Fri, 09 Nov 2018 17:59:24 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
to Raptor WAF 0.6 By packetstormsecurity.com Published On :: Sun, 14 Apr 2019 20:22:22 GMT Raptor is a web application firewall written in C that uses DFA to block SQL injection, cross site scripting, and path traversals. Full Article
to Web-Based Firewall Logging Tool 1.1.2 By packetstormsecurity.com Published On :: Fri, 20 Sep 2019 22:17:54 GMT Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target. Full Article
to SkyWrapper Discovery Tool By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:07:50 GMT SkyWrapper is a tool from CyberArk that helps to discover suspicious creation forms and uses of temporary tokens in AWS. Full Article
to Bing.com Hostname / IP Enumerator 1.0.2 By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:28:49 GMT This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget. Full Article
to Capstone 4.0.2 By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:01:48 GMT Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more. Full Article
to Google Pays $65k To Shutter 23 Chrome Bugs By packetstormsecurity.com Published On :: Mon, 30 May 2016 16:57:54 GMT Full Article headline flaw google chrome
to Chrome To Label FTP Sites Insecure By packetstormsecurity.com Published On :: Fri, 15 Sep 2017 14:44:47 GMT Full Article headline google chrome
to Google Taking New Steps To Prevent Malicious Chrome Extensions By packetstormsecurity.com Published On :: Wed, 03 Oct 2018 14:03:54 GMT Full Article headline malware google chrome
to North Korean APT Uses Chrome Extension To Infect Victims By packetstormsecurity.com Published On :: Wed, 05 Dec 2018 15:45:34 GMT Full Article headline hacker government malware cyberwar google korea chrome
to Evernote Critical Flaw Opened Personal Data Of Millions To Attack By packetstormsecurity.com Published On :: Fri, 14 Jun 2019 16:08:21 GMT Full Article headline privacy flaw chrome
to Google Chrome To Block Heavy Ads That Use Too Many Resources By packetstormsecurity.com Published On :: Thu, 04 Jul 2019 14:06:10 GMT Full Article headline google chrome