A static analysis tool to find web endpoints
Existing tools were either dead, regex-based, or didn’t support the analysis capabilities he wanted, so he built and open sourced endpointfinder, which parses JavaScript code…
Existing tools were either dead, regex-based, or didn’t support the analysis capabilities he wanted, so he built and open sourced endpointfinder, which parses JavaScript code…
Jul 04, 2023Ravie LakshmananNetwork Security / Exploit No less than 330000 FortiGate firewalls are still unpatched and vulnerable to CVE-2023-27997, a critical security flaw affecting…
New Clipper malware variants have emerged, specifically designed to target individuals engaged in cryptocurrency transactions. During these transactions, it was noted that these variants were…
PlainsCapital Bank, one of the largest independent banks in Texas and a subsidiary of Hilltop Holdings Inc, has confirmed a breach linked to the MOVEit…
In this talk, Steve describes the various use cases of a software bill-of-materials (BOM), including facilitating accurate vulnerability and other supply-chain risk analysis, and gives…
Luna Hotels & Resorts, a Portuguese prominent hotel chain, has allegedly fallen victim to a cyber attack. The Medusa ransomware group, notorious for its malicious…
Researchers reported that there are 490,000 Fortinet firewalls exposing SSL VPN interfaces on the internet, and roughly 69% of them are still vulnerable to CVE-2023-27997.…
Just a day after hacktivists group “Anonymous Sudan” took claim of cyber-attack on Microsoft servers to steal info from over 30 million accounts, the Satya…
GhostSec hackers have taken responsibility for the TAP Air Portugal cyber attack, claiming to exfiltrate 350GB of data. They have further demanded a ransom to…
What I Learned Watching All 44 AppSec Cali 2019 Talks OWASP AppSec California is one of my favorite security conferences: the talks are great, attendees…
IT leaders are losing sleep over improving overall IT performance (60%), data security (50%), process risk and compliance (46%), and the need to improve agility…
Aggregated honeypot data, over a six-month period, showed that more than 50% of the attacks focused on defense evasion, according to Aqua Security. Threat actors…