• Cybersecurity Roundup #16

    “It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” — Stephane Nappo Windows Subsystem for Linux 2 bypasses the Windows 10 Firewall The Windows Subsystem for Linux 2 will bypass the Windows 10… read more »
  • Privacy Roundup #15

    “Privacy means people know what they’re signing up for, in plain language, and repeatedly. I believe people are smart. Some people want to share more than other people do. Ask them.” – Steve Jobs … read more »
  • Technology Roundup #15

    “We've arranged a civilization in which most crucial elements profoundly depend on science and technology.” - Carl Sagan … read more »
  • “Sentinel of Eternity” is out

    Yes, the title is an hommage to the science fiction short story by British author Arthur C. Clarke, which was used as a starting point for the 1968 novel and film ”2001: A Space Odyssey”. This new LP is set… read more »
  • CloudBrute: a multi-platform Cloud Enumeration Tool

    CloudBrute is a multiple platform tool that finds and enumerates a target company’s cloud infrastructure, files, open buckets, applications, and databases hosted on top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode), and possibly applications behind proxy servers. The tool [1], developed in GO by security researcher… read more »
  • New Mimikatz update adds exploit for ZeroLogon (CVE-2020-1472) vulnerability

    Mimikatz' developer Benjamin Delpy, has updated the latest version of the well-known tool to exploit the ZeroLogon vulnerability. Mimikatz Mimikatz [2] is an open source tool designed to target devices running Windows OS and can run pass-the-hash, pass-the-ticket, kerberoasting, and more.  ZeroLogon (CVE-2020-1472) Discovered by Secura's… read more »
  • Red Commander: open source Red Team C2 Infrastructure

    Red Commander is a red team C2 infrastructure built in Amazon AWS using Ansible. The tool [1] is developed by Alex Williams, security consultant at GuidePoint Security, and can help pentesters improve their defensive responses but can also be used by adversaries to simulate their attacks.… read more »
  • Noctilucent brings back 'domain fronting' as 'domain hiding'

    At the DEF CON 2020, the security researcher Erik Hunstad has released a new tool that can help users to evade censorship and bypass firewalls to keep services up inside problematic areas of the globe. Domain fronting, the technique of… read more »