Plus récents

🛠 Get-UnJlaive is a tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.

github.com/Dump-GUY/Get-UnJlai

🔒 Combination of TLS & HTTP fingerprinting. Open-source browser Firefox flagged as « suspicious » by anti-bot protection by a customer-specific rule.

lwthiker.com/opensource/2022/0

Developers often make typical mistakes that allow an attacker to gain access to the app's internal files, which store sensitive data. This article describes the most typical mistakes.

blog.oversecured.com/Android-s

🇦🇷 It took 6 hours to get access to every IT system of Argentina's Senate ( Vice Society )

When they realized that we crypted their network we were still there. We were watching them using their cameras. It was funny.

databreaches.net/it-took-6-hou

🇫🇷 L'ANS présente l'INS. « L'INS, c'est l'identité que tous les professionnels vont utiliser pour nous identifier en tant que patients, en tant qu'usagers et ainsi référencer toutes nos données de santé »

youtube.com/watch?v=_WmDmEoIIG

Afficher le fil de discussion

🇺🇸 A massive data breach has exposed four years' worth of records of nearly 500,000 Chicago Public Schools students and just under 60,000 employees, district officials.

chicago.suntimes.com/education

In 2017, a group of former GameOver Zeus network affiliates referring to themselves as « The Business Club » changed the tactics they had been using for the past few years to adopt ransomware.

linkedin.com/pulse/good-grief-

Plus anciens