A vulnerability was found in code-projects Online Notice Board up to 1.0 and classified as critical. This issue affects some unknown processing of the file /registration.php of the component Profile Picture Handler. The manipulation of the argument img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

ALL

4

This service is collecting, indexing, and centralizing ransomware information from most ransomware groups and their victims.

Ransomware.live monitors the extortion sites used by ransomware groups. The information posted on this website is dynamically updated in near real-time.

Ransomwatch trails the extortion sites used by ransomware groups and surfaces an aggregated feed of claims.

Tools and Techniques for Red Team / Penetration Testing.

Explore security resources, trends and updates, media, podcast episodes, and more.

Defuse Security. Home of PIE Bin, TRENT, and more...

Stay informed and empowered with Forcepoint Security Insights. Gain valuable knowledge and insights into the ever-evolving world of cybersecurity.

Explore GreyNoise Intelligence with industry-leading analysis, product tips, and emerging research in our ongoing Cybersecurity Blog.

The ATLAS Matrix shows the progression of tactics used in attacks as columns from left to right, with ML techniques belonging to each tactic below. & indicates an adaption from ATT&CK.

A one stop shop for AI security education. Use Nightfall's growing library to learn new concepts evolving in today's world of artificial intelligence or refresh yourself on AI security's core topics.

Discover the latest trends in data loss prevention and information security. Gain insights from thought leaders and industry experts.

GitHub public repositories matching the '#hacking' topic.

Get the latest news, insights and updates from bot experts from the Netacea blog.

Stay updated with SecurityScorecard's latest blog posts, featuring weekly insights on cybersecurity trends and best practices.

The list of research articles compiled by SecurityScorecard.

A cybersecurity and technology news platform that also publishes in-depth guides, tutorials, and reviews.

Check out our latest threat hunting articles, tips and stories.

Collection of malware source code for a variety of platforms in an array of different programming languages.

Analyze suspicious files and URLs, at scale, millions of times per day. Get real-time threat intel from a crowdsourced network of security experts and antivirus companies competing to protect you.

Discover expert analysis and thought leadership on the latest trends in corporate intelligence and cyber security. Explore and subscribe to our extensive range of bulletins and briefings. Catch up on the content you may have missed.

Red Team Lab, Active Directory Lab, Red Team Trainings, Azure Pentesting, Azure Security, Azure Red Team Lab, Enterprise Security and Red Team Certifications (CRTP, CRTE, CRTM, CARTP and more)

Stay updated on everything product security with Cybellum`s blog. We cover topics such as SBOM, vulnerabilities, and industry cyber security regulations.

The quiz for phishing. Can you spot when you’re being phished? Identifying phishing can be harder than you think. Phishing is an attempt to trick you into giving up your personal information by pretending to be someone you know. Can you tell what's fake?

A subdomain finder is a tool used to find the subdomains of a given domain.

Weakpass collection of tools for bruteforce and hashcracking.

GitHub public repositories matching the '#malware' topic.

GitHub public repositories matching the '#redteam' topic.

Directory of onion sites in darkweb. Fresh and reliable list of dark web sites from search engines to chat rooms and forums.

Learn how our open source technology and browser fingerprinting API help prevent online fraud on our blog.

Guides that cover security, privacy, and anonymity grouped by their importance.

The largest truly open library in human history. We mirror Sci-Hub and LibGen. We scrape and open-source Z-Lib, DuXiu, and more. 35,495,093 books, 103,135,237 papers — preserved forever. All our code and data are completely open source.

The Radware Blog shares vital knowledge with IT decision makers on application delivery, virtualization/cloud, security and specialized service provider needs.

Radware’s Live Threat Map presents near real-time information about cyberattacks as they occur, based on our global threat deception network and cloud systems event information. The systems transmit a variety of anonymized and sampled network and application attacks to our Threat Research Center and are shared with the community via this threat map.

Find accurate phone numbers, addresses and emails from the most trusted U.S. white pages phone directory and address lookup since 1997.

Cybersecurity news feed collected from many sites.

The latest information and archives of advisories.

Risky Business publishes cybersecurity newsletters and podcasts for security professionals.

The Barracuda blog brings you the latest news, research, and insights you can’t get anywhere else.

Gain valuable insights for analysts, threat hunters, and SecOps professionals with our cybersecurity blog! Explore all posts or browse by category.