PRINT
PRINT
SEND MAIL
SEND MAIL

Month: July 2019

NEW TOOLSPython3penetration testingTOREmailsUsernamesProfilerH8MailBusterInteligenceSocial Accounts

Buster – Find Emails Of A Person And Return Info Associated With Them

Buster is a simple OSINT tool used to:Get social accounts from various sources(gravatar,about.me,myspace,skype,github,linkedin,avast)Get links to where the email was found using google,twitter,darksearch and paste sitesGet domains registered with an email (reverse whois)Generate possible emails and usernames of a personFind the email of a social media accountFind emails from a usernameFind the work email of a person using hunter.ioInstallationclone the repository:$ git clone git://github.com/sham00n/busterOnce you have a copy of the source, you can install it with:$ cd buster/$ python3 setup.py install$ buster -hAPI keysThis project…

NEW TOOLSHacking NewsNEWSPodcastscyber security newscyber security podcastcyberwiredaily hack newshack newshack news podcastlatest hacking news podcastlhnlhn podcastthe hacker news

Latest Hacking News Podcast #336

Georgia Department of Public Safety Falls Victim to Ransomware, OXID E-Shop Exploit, Cybercriminals Now Using Comobolists-As-Service Model to Sell Credentials, Latest Hacking News Podcast #336 on Latest Hacking News.

Security FeedsMalware StatisticsPublicationsFinancial malwareFeaturedMobile MalwareTrojan Banker

Financial threats in H1 2019

Introduction and methodology Financial cyberthreats are malicious programs that attack users of online banking services, electronic money, cryptocurrency and other similar services, as well as threats aimed at gaining access to financial organizations and their infrastructure. Kaspersky experts regularly analyze the statistics that the company’s products anonymously send to the cloud infrastructure of the Kaspersky Security Network (KSN) in case users agree to transfer such data. In order to study the threat landscape of the financial sector, the researchers analyzed cases of malicious activity…

Cyber ThreatsGuru's Picks

Securonix Enhances SIEM Platform With Analytics-Driven SOAR 2.0.

Securonix, Inc., the leader in Next-Gen SIEM, today announced the general availability of its SOAR 2.0 product. With integrated SIEM, UEBA, and SOAR capabilities, the Securonix Next-Gen SIEM platform provides end-to-end threat detection, investigation, and response enabling customers to significantly reduce their mean time to respond (MTTR) and improve operational efficiency. “Our vision is to provide customers with an end-to-end analytics platform to rapidly detect and respond to advanced threats,” said Tanuj Gulati, CTO and co-founder at Securonix. “Embedding the CyberSponse SOAR capabilities into…

NEW TOOLSHacking NewsPersonal InformationNEWScyber security newscloud servercustomer data leakeddata breachleaked user datauser data compromisedCyber Attackusers informationpersonal datapersonal data exposedcustomer data hackdata hackdata hackedbankbank dataBank hackCapital OneCapital One data breachCapital One hackedCloud Platformhack

Capital One Data Breach Affected Millions Of US And Canada Citizens

Once again, a huge data breach incident has impacted millions of customers. The US-based bank holding firm Capital One Financial Capital One Data Breach Affected Millions Of US And Canada Citizens on Latest Hacking News.

NEW TOOLSHacking NewsDATA LEAKNEWScyber security newscustomer data leakeddata exposeddata leakedemail marketingLeaky databaseUnsecured serverdata exposeNo password on databaseunprotected databaseunsecured databaseusers informationAmazon S3 bucketS3 BucketS3 bucket leakede-marketing data exposedFormGetFormGet data exposedFormGet data leakFormGet data leaked

Indian Marketing Firm FormGet Publicly Exposed Users’ Documents Via Unsecured Server

Once again, a firm has breached users’ privacy by exposing customers data publicly via an unsecured cloud server. This time, Indian Marketing Firm FormGet Publicly Exposed Users’ Documents Via Unsecured Server on Latest Hacking News.

NEW TOOLSDistributedEmulatorWDExtractWindows Defender

WDExtract – Extract Windows Defender Database From Vdm Files And Unpack It

Extract Windows Defender database from vdm files and unpack itThis program distributed as-is, without any warranty;No official support, if you like this tool, feel free to contribute.FeaturesUnpack VDM containers of Windows Defender/Microsoft Security Essentials;Decrypt VDM container embedded in Malicious software Removal Tool (MRT.exe);Extract all PE images from unpacked/decrypted containers on the fly (-e switch): dump VDLLs (Virtual DLLs);dump VFS (Virtual File System) contents;dump signatures auxiliary images;dump GAPA (Generic Application Level Protocol Analyzer) images used by NIS (Network Inspection System);code can be adapted to dump…

NEW TOOLSHacking NewsNEWSPodcastscyber security newscyber security podcastcyberwiredaily hack newshack newshack news podcastlatest hacking news podcastlhnlhn podcastthe hacker news

Latest Hacking News Podcast #335

Capital One Massive Data Breach – 106 Million Customer Records, VxWorks Critical Vulnerabilities,  New Android Malware – Filecoder.C   Today’s Latest Hacking News Podcast #335 on Latest Hacking News.

NEW TOOLSHacking Toolsbest github hacking toolsFree Hacking ToolsGitHub hack toolsGithub hacker toolsGithub pen test toolshacking tool LHNlatest hacking news toolsLHN hack toolLHN hack toolsopen source hack toolpen testing tools freecloakify demonstrationcloakify downloadcloakify hacking toolcloakify how to usewhere to find cloakify

Cloakify – A Tool to Mask Your Data in Plain Sight

Cloakify Factory is a tool to transforms any file type into a list of harmless and even useless looking strings. Cloakify – A Tool to Mask Your Data in Plain Sight on Latest Hacking News.