IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3 uses a web link with untrusted references to an external site. A remote attacker could exploit this vulnerability to expose sensitive information or perform unauthorized actions on the victims’ web browser.

ALL

4

Providing intel from some of the darkest places on the Dark Web & Clearnet. Breaches, Darknet Markets, Ransomware, Threat Alerts, & more!

Analyze files in seconds! Zero Miss for Office Malware Threats.

Google’s Safe Browsing technology examines billions of URLs per day looking for unsafe websites. Every day, we discover thousands of new unsafe sites, many of which are legitimate websites that have been compromised. When we detect unsafe sites, we show warnings on Google Search and in web browsers. You can search to see whether a website is currently dangerous to visit.

Learn about popular cybersecurity topics and stay up-to-date with the latest cybersecurity news and insights, as well as product updates and announcements.

A curated list of amazingly awesome OSINT.

Web technology information profiler tool. Find out what a website is built with.

A FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process.

Nmmapper offers nmap scans,9 subdomain finder tools,theHarvester,wappalyzer,whatweb online.

Illuminate the reputation behind an email address.

Explore more than 866 billion web pages saved over time.

A dashboard for monitoring ransomware groups, threat intelligence.

This service is collecting, indexing, and centralizing ransomware information from most ransomware groups and their victims.

Ransomware.live monitors the extortion sites used by ransomware groups. The information posted on this website is dynamically updated in near real-time.

Ransomwatch trails the extortion sites used by ransomware groups and surfaces an aggregated feed of claims.

Tools and Techniques for Red Team / Penetration Testing.

Explore security resources, trends and updates, media, podcast episodes, and more.

Defuse Security. Home of PIE Bin, TRENT, and more...

Stay informed and empowered with Forcepoint Security Insights. Gain valuable knowledge and insights into the ever-evolving world of cybersecurity.

Explore GreyNoise Intelligence with industry-leading analysis, product tips, and emerging research in our ongoing Cybersecurity Blog.

The ATLAS Matrix shows the progression of tactics used in attacks as columns from left to right, with ML techniques belonging to each tactic below. & indicates an adaption from ATT&CK.

A one stop shop for AI security education. Use Nightfall's growing library to learn new concepts evolving in today's world of artificial intelligence or refresh yourself on AI security's core topics.

Discover the latest trends in data loss prevention and information security. Gain insights from thought leaders and industry experts.

GitHub public repositories matching the '#hacking' topic.

Get the latest news, insights and updates from bot experts from the Netacea blog.

Stay updated with SecurityScorecard's latest blog posts, featuring weekly insights on cybersecurity trends and best practices.

The list of research articles compiled by SecurityScorecard.

A cybersecurity and technology news platform that also publishes in-depth guides, tutorials, and reviews.

Check out our latest threat hunting articles, tips and stories.

Collection of malware source code for a variety of platforms in an array of different programming languages.

Analyze suspicious files and URLs, at scale, millions of times per day. Get real-time threat intel from a crowdsourced network of security experts and antivirus companies competing to protect you.

Discover expert analysis and thought leadership on the latest trends in corporate intelligence and cyber security. Explore and subscribe to our extensive range of bulletins and briefings. Catch up on the content you may have missed.

Red Team Lab, Active Directory Lab, Red Team Trainings, Azure Pentesting, Azure Security, Azure Red Team Lab, Enterprise Security and Red Team Certifications (CRTP, CRTE, CRTM, CARTP and more)

Stay updated on everything product security with Cybellum`s blog. We cover topics such as SBOM, vulnerabilities, and industry cyber security regulations.

The quiz for phishing. Can you spot when you’re being phished? Identifying phishing can be harder than you think. Phishing is an attempt to trick you into giving up your personal information by pretending to be someone you know. Can you tell what's fake?

A subdomain finder is a tool used to find the subdomains of a given domain.

Weakpass collection of tools for bruteforce and hashcracking.

GitHub public repositories matching the '#malware' topic.

GitHub public repositories matching the '#redteam' topic.

Directory of onion sites in darkweb. Fresh and reliable list of dark web sites from search engines to chat rooms and forums.

Learn how our open source technology and browser fingerprinting API help prevent online fraud on our blog.