The airPASS from NetVision Information has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

ALL

2

Stay up-to-date with the latest file extensions being used by attackers.

Enter a domain or URL into the search engine to view details about its current URL categories. To request recategorization of this website, click Request Change below the search results.

PoC auto collect from GitHub. Be careful Malware.

Infosec's favorite weekly newsletter for news, tools, and tips with 18,000+ CISOs, founders, change-makers, and straight up hackers.

AttackIQ Academy combats cyberthreats with free courses by top experts. Enjoy hands-on learning in MITRE ATT&CK®, purple teaming, and breach & attack simulation, earning badges and certifications. Enhance your cybersecurity skills at no cost as part of the Informed Defender Community. Join us and become a cybersecurity hero today!

PolySwarm is a crowdsourced threat detection marketplace where security experts & AV companies compete to protect you.

A site for sharing packet capture (pcap) files and malware samples. I started this blog in 2013 to share pcaps and malware samples. Due to issues with Google, I've had to take most all blog posts downfrom 2013 through 2018, and I've been slowly restoring these pages using a new pattern for the password-portected zip archives.

Read McAfee Labs blogs for the latest threat research, threat intelligence, and thought leadership from the Threat Research team.

In the contemporary cybersecurity landscape, Security Operations Centers find themselves besieged by an overwhelming number of cyber threats, escalating in both frequency and complexity, leaving traditional...

Your go-to source for expert red team tips and tricks. Elevate your cybersecurity game with our insightful content.

The site for people they like to build Network Servers with CentOS, Ubuntu, Fedora, Debian, Windows Server.

AMSI.fail generates obfuscated PowerShell snippets that break or disable AMSI for the current process. The snippets are randomly selected from a small pool of techniques/variations before being obfuscated. Every snippet is obfuscated at runtime/request so that no generated output share the same signatures.

Living Off The Land Payload Generator.

The Netwrix blog is a free source of best practices, trends and expert advice for cybersecurity and IT pros.

Expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance.

We keep you posted on the latest cyber threats. Learn more about what is new in the world of IT security. Knowledge is the best protection.

Adversary techniques for credential theft and data compromise.

Trusted cybersecurity news, research, and threat intelligence by our experts.

HAWKEYE Managed SOC Dubai powered by DTS Solution helps your organization strategize, develop, build and manage a Managed Security Operations Center – SOC 2.0 As A Service. Managed Security Services Dubai, Managed SOC Provider in Dubai.

Kaspersky Threat Intelligence Portal allows you to scan files, domains, IP addresses, and web addresses for threats, malware, viruses

The Technique Inference Engine (TIE) suggests techniques an adversary is likely to have used based on a set of observed techniques. Cyber defenders can use this data to prioritize specific techniques for threat hunting, and incident responders can use this information to highlight important lateral movement and persistence behaviors that are essential to threat eviction and recovery.

Living Off the Orchard. macOS Binaries (LOOBins) is designed to provide detailed information on various built-in macOS binaries and how they can be used by threat actors for malicious purposes.

The repository tries to gather an information about Windows persistence mechanisms to make the protection/detection more efficient. Most of the information is well known for years, being actively used within various scenarios.

Vumetric Cyber portal is a public security news, threat indicators and CVE security vulnerability database/information source.

NetworkLessons.com offers a range of Networking courses, including Cisco CCNA, CCNP and CCIE Routing & Switching. You find an overview of all courses below.

Last 3 days of cybersecurity industry content aggregated for your analysts. ThreatABLE provides a vendor-agnostic roll-up of cyber threat intelligence to employees of organizations of any size. We aim to provide everyone from analysts to CISOs a one-stop-shop to sift through the gargantuan amounts of data that comes flooding into the industry every day.

CBT Nuggets is the best way to learn IT, our blog is the best way to learn about CBT Nuggets.

Discover the latest news and updates in secure coding and application security with SecureFlag.

Visit often to get the latest data protection news and information you can use in your fight against ransomware, malware, and other threats.

Follow the latest phishing trends by reading articles published by the CanIPhish team.

Welcome to our blog! You’ll find the best opt-out guides, in-depth privacy research, and privacy blog posts here. With the help of our experts, you’ll take the first steps towards taking control of your data privacy.

Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks. The project helps security professionals stay informed and mitigate potential threats.

Interactive Kubernetes Security Learning Playground.

Learn OSINT for free by subscribing to our newsletter. Discover the best Open-Source Intelligence (OSINT) tools, techniques, and valuable resources.

Stay up to date with the latest cybersecurity insights, practical advice, articles and news from the Veriti Experts.

Stay up to date Cyber Security insights & trends. Our experts share their knowledge on the latest threats, security solutions & best practices to keep your business safe.