- Files ≈ Packet Storm
- Asterisk Project Security Advisory - AST-2022-003
- Asterisk Project Security Advisory - AST-2022-002
- Asterisk Project Security Advisory - AST-2022-001
- Siemens A8000 CP-8050/CP-8031 SICAM WEB Missing File Download / Missing Authentication
- Are You Really Muted? A Privacy Analysis Of Mute Buttons In Video Conferencing Apps
- Backdoor.Win32.NetSpy.10 Remote Command Execution
- Backdoor.Win32.NetCat32.10 Remote Command Execution
- Backdoor.Win32.NinjaSpy.c Authentication Bypass
- Email-Worm.Win32.Pluto.b Insecure Permissions
- Backdoor.Win32.Kilo.016 Denial Of Service
- HackTool.Win32.IpcScan.c Buffer Overflow
- Backdoor.Win32.Psychward.03.a Weak Hardcoded Password
- Backdoor.Win32.Prorat.cwx Insecure Permissions
- Backdoor.Win32.MotivFTP.12 Authentication Bypass
- Red Hat Security Advisory 2022-1379-01
- Red Hat Security Advisory 2022-1378-01
- Microsoft HTTP Protocol Stack Denial Of Service
- Sec-News 安全文摘
- CXSECURITY Database RSS Feed - CXSecurity.com
- Easy!Appointments Information Disclosure
- Backdoor.Win32.NinjaSpy.c / Authentication Bypass
- jsharp Technology - Sql Injection Vulnerability
- Signature Software - Sql Injection Vulnerability
- Miracle Hunt Services - Sql Injection Vulnerability
- HackTool.Win32.IpcScan.c / Local Stack Buffer Overflow
- Email-Worm.Win32.Pluto.b / Insecure Permissions
- Backdoor.Win32.Prorat.cwx / Insecure Permissions
- Backdoor.Win32.NetSpy.10 / Unauthenticated Remote Command Execution
- Backdoor.Win32.Psychward.03.a / Weak Hardcoded Password
- Backdoor.Win32.Kilo.016 / Denial of Service (UDP Datagram)
- Backdoor.Win32.NetCat32.10 / Unauthenticated Remote Command Execution
- Sploitus.com Exploits RSS Feed
- Backdoor.Win32.Kilo.016 Denial Of Service exploit
- Backdoor.Win32.NetCat32.10 Remote Command Execution exploit
- Siemens A8000 CP-8050/CP-8031 SICAM WEB Missing File Download / Missing Authentication exploit
- Backdoor.Win32.NetSpy.10 Remote Command Execution exploit
- Microsoft HTTP Protocol Stack Denial Of Service exploit
- Backdoor.Win32.MotivFTP.12 Authentication Bypass exploit
- Backdoor.Win32.Psychward.03.a Weak Hardcoded Password exploit
- Email-Worm.Win32.Pluto.b Insecure Permissions exploit
- Backdoor.Win32.Prorat.cwx Insecure Permissions exploit
- HackTool.Win32.IpcScan.c Buffer Overflow exploit
- Backdoor.Win32.NinjaSpy.c Authentication Bypass exploit
- Exploit for CVE-2021-31805 exploit
- Exploit for CVE-2022-22954 exploit
- Exploit for CVE-2022-26809 exploit
- Exploit for Vulnerability in Wps Wps Office exploit
- Exploit for Vulnerability in Microsoft exploit
- Exploit for Code Injection in Vmware Spring Cloud Gateway exploit
- Exploit for CVE-2022-29072 exploit
- 跳跳糖 - 安全与分享社区
- Security Boulevard
- PHP Web Application Security – How to protect your WordPress website
- What’s the Best Movie About Hackers? (Book Review)
- INCONTROLLER: Acting to Protect Customers from Unknown Threats
- BSides Budapest 2021: Vivek Malik’s & Kumar Vikramjeet’s ‘One Stop Anomaly Shop’
- Russia Losing War Because Unable to “Build Airplane in Flight”
- CISO Thoughts with David Lindner – April 15
- Online Document Verification: How Does It Work?
- Joy Of Tech® ‘AI Mood Detector’
- obaby@mars
- 安全客-有思想的安全新媒体
- FreeBuf网络安全行业门户
- 绿盟科技技术博客
- Trail of Bits Blog
- SpiderLabs Blog from Trustwave
- Hex Rays
- Reverse Engineering
- The Daily Swig | Cybersecurity news and views
- Hacking Articles
- SentinelOne
- HAHWUL
- Ghostlulz Hacks
- 奇客Solidot–传递最新科技情报
- KitPloit - PenTest & Hacking Tools
- Blog – NTT Application Security
- Forensic Focus
- Have I Been Pwned latest breaches
- IT Service Management News
- Troy Hunt's Blog
- Il Disinformatico
- Daniel Miessler
- 0x00sec - The Home of the Hacker - Top topics
- SANS Internet Storm Center, InfoCON: green
- Schneier on Security
- bellingcat
- TG Soft Software House - News
- IntelTechniques Blog
- Security Affairs
- Threat actors use Zimbra exploits to target organizations in Ukraine
- Conti Ransomware Gang claims responsibility for the Nordex hack
- ZingoStealer crimeware released for free in the cybercrime ecosystem
- Auth bypass flaw in Cisco Wireless LAN Controller Software allows device takeover
- Google fixed third zero-day in Chrome since the start of 2022
- Ways to Develop a Cybersecurity Training Program for Employees
- Analysis of the SunnyDay ransomware
- The Register - Security
- Feds offer $5m reward for info on North Korean cyber crooks
- Star loses $500,000 NFT after crooks exploit Rarible market
- Cybercriminals do their homework for latest banking scam
- Google issues third emergency fix for Chrome this year
- North Korea's Lazarus cyber-gang caught 'spying' on chemical sector companies
- Dark Reading
- Google Emergency Update Fixes Chrome Zero-Day
- Cloud Cost, Reliability Raise IT Concerns
- Lazarus Targets Chemical Sector With 'Dream Jobs,' Then Trojans
- CISA Alert on ICS, SCADA Devices Highlights Growing Enterprise IoT Security Risks
- Cybersecurity Act of 2022: A Step in the Right Direction With a Significant Loophole
- Securityinfo.it
- TS-WAY
- KitPloit - PenTest Tools!
- Threatpost
- TorrentFreak
- Computer Forensics
- Full Disclosure
- Adversary3 v1.0 / Malware vulnerability intel tool for third-party attackers / updated
- Email-Worm.Win32.Pluto.b / Insecure Permissions
- Backdoor.Win32.Kilo.016 / Denial of Service (UDP Datagram)
- Backdoor.Win32.NinjaSpy.c / Authentication Bypass
- Backdoor.Win32.NetSpy.10 / Unauthenticated Remote Command Execution
- Backdoor.Win32.NetCat32.10 / Unauthenticated Remote Command Execution
- HackTool.Win32.IpcScan.c / Local Stack Buffer Overflow
- Backdoor.Win32.Psychward.03.a / Weak Hardcoded Password
- Backdoor.Win32.Prorat.cwx / Insecure Permissions
- Backdoor.Win32.MotivFTP.12 / Authentication Bypass
- SEC Consult SA-20220413 :: Missing Authentication at File Download & Denial of Service in Siemens A8000 PLC
- Your Hacking Tutorial by Zempirians
- /r/netsec - Information Security News & Discussion
- [Techmonitor.ai] Failed cyberattack on Ukraine's electricity grid could indicate Russia's growing willingness to attack critical infrastructure
- iViewed your API keys
- New tool to exploit TURN servers - create a socks proxy into the internal network
- Multiple Vulnerabilities in Cisco Expressway
- Turncoat - Extract private messages from malware/phishing Telegram Bots
- PYSA Ransomware Group Technical Analysis
- Blackhat Library: Hacking techniques and research
- Hakin9 – IT Security Magazine
- Deeplinks
- Paul's Security Weekly