-
Dec 20, 2019
POCKINT stands for "Pocket Intelligence".It is an OSINT multi purposes GUI program designed to be a lightweight and portable. POCKINT provides users with essential OSINT capabilities: input box accepts typical indicators (URL, IP, MD5) and gives users the ability to… read more »
-
Dec 19, 2019
According to a TrendMicro's report, 'The New Norm', the major cybersecurity risks for organizations in 2020 comes from DevOps, third-party libraries, container components and even remote workers. A pleasant reading for the Christmas holidays! The report [1] warns of a… read more »
-
Dec 18, 2019
Security research group Check Point Research recently uncovered a flaw in WhatsApp through which a single malicious user could crash the apps of all members of a group chat. After joining a group chat, a malicious user could edit specific… read more »
-
Dec 17, 2019
Some days ago, I've been looking at a website named "IBM 360 Model 20 Rescue and Restoration": a group of brave engineer started the project of restoration of an IBM System 360 Model 20, documenting all steps of the process.… read more »
-
Dec 16, 2019
Few news this week: a couple of link about ransomware (Ryuk and Snatch), an interesting attack on Intel CPUs, a Windows 0day and a phishing attack on Office365.Then, a security incident on S3 buckets and an interesting article about DNS… read more »
-
Dec 13, 2019
Google and Facebook help connect the world and provide crucial services to billions users, but this services come at a systemic cost. In a new report (a 60 page free PDF [1]), Amnesty International warned about Facebook and Google’s surveillance… read more »
-
Dec 12, 2019
British security firm Pen Test Partners tells us a creepy cybersecurity story set in a place difficult to associate with computers: the engine room of a ship. During a penetration test, the company discovered an unknown device connected to the… read more »
-
Dec 11, 2019
Security researcher Kishan Bagaria found a "bug" in AirDrop that let him repeatedly sent files to all devices able to accept files within wireless range of an attacker. How it works? The flaw, dubbed AirDoS, exploits the absence of receive… read more »