Image 1 Packet Storm Hard Reboot

Posted: 2024/12/04
Source: Packet Storm
Tag(s): Headline, Hacker
Image 1 Apple Illegally Surveilled and Censored Workers, Employee Lawsuit Says

Posted: 2024/12/03
Source: Gizmodo
Tag(s): Apple, Data Loss, Fraud, Phone, Privacy, Headline, Spyware
Image 1 Corrupted Microsoft Office Documents Used in Phishing Campaign

Posted: 2024/12/03
Source: SC Magazine
Tag(s): Cybercrime, Microsoft, Phish, Headline, Password
Image 1 Meta Says It Has Taken down 20 Covert Influence Ops in 2024

Posted: 2024/12/03
Source: The Guardian
Tag(s): Cyberwar, Facebook, Fraud, Headline, Russia
Image 1 Severity of Risk Facing the UK Is Widely Underestimated

Posted: 2024/12/03
Source: The Register
Tag(s): Britain, Cybercrime, Government, Headline, Cyberwar
Image 1 Russia Gives Life Sentence to Hydra Dark Web Kingpin after Seizing a Ton of Drugs

Posted: 2024/12/03
Source: The Register
Tag(s): Cybercrime, Headline, Russia
Image 1 Hackers Stole $1.49 Billion in Cryptocurrency to Date in 2024

Posted: 2024/12/03
Source: Security Week
Tag(s): Cryptography, Data Loss, Hacker, Headline, Cybercrime
Image 1 760k Employee Records from Major Firms Leaked Online

Posted: 2024/12/03
Source: Security Week
Tag(s): Data Loss, Headline, Privacy
Image 1 Code Found Online Exploits LogoFAIL to Install Bootkitty Linux Backdoor

Posted: 2024/12/02
Source: ars technica
Tag(s): Backdoor, Linux, Malware, Headline, Flaw
Image 1 Zabbix Urges Upgrades after Critical SQL Injection Bug Disclosure

Posted: 2024/12/02
Source: The Register
Tag(s): Flaw, Headline, Patch
Image 1 Packet Storm Hard Reboot

Posted: 2024/12/04
Source: Packet Storm
Tag(s): Headline, Hacker
Image 1 Apple Illegally Surveilled and Censored Workers, Employee Lawsuit Says

Posted: 2024/12/03
Source: Gizmodo
Tag(s): Apple, Data Loss, Fraud, Phone, Privacy, Headline, Spyware
Image 1 Corrupted Microsoft Office Documents Used in Phishing Campaign

Posted: 2024/12/03
Source: SC Magazine
Tag(s): Cybercrime, Microsoft, Phish, Headline, Password
Image 1 Meta Says It Has Taken down 20 Covert Influence Ops in 2024

Posted: 2024/12/03
Source: The Guardian
Tag(s): Cyberwar, Facebook, Fraud, Headline, Russia
Image 1 Severity of Risk Facing the UK Is Widely Underestimated

Posted: 2024/12/03
Source: The Register
Tag(s): Britain, Cybercrime, Government, Headline, Cyberwar
Image 1 Russia Gives Life Sentence to Hydra Dark Web Kingpin after Seizing a Ton of Drugs

Posted: 2024/12/03
Source: The Register
Tag(s): Cybercrime, Headline, Russia
Image 1 Hackers Stole $1.49 Billion in Cryptocurrency to Date in 2024

Posted: 2024/12/03
Source: Security Week
Tag(s): Cryptography, Data Loss, Hacker, Headline, Cybercrime
Image 1 760k Employee Records from Major Firms Leaked Online

Posted: 2024/12/03
Source: Security Week
Tag(s): Data Loss, Headline, Privacy
Image 1 Code Found Online Exploits LogoFAIL to Install Bootkitty Linux Backdoor

Posted: 2024/12/02
Source: ars technica
Tag(s): Backdoor, Linux, Malware, Headline, Flaw
Image 1 Zabbix Urges Upgrades after Critical SQL Injection Bug Disclosure

Posted: 2024/12/02
Source: The Register
Tag(s): Flaw, Headline, Patch

storm watch (⇩)

2024-12-04: 1 news article added
2024-12-03: 25 files added
2024-11-10: 21 voting polls added

2024-11-30 (1732924800)

Temporary RSS feeds added.
Fixed BlueSky integration.
Fixed chat bug.
Minor JS and CSS updates.
...
[ View Full Changelog ]


grab gear (⇩)

Hat Hoodie Mousepad
Hat Hoodie Mousepad

Mug Shirts Phonecase
Mug Shirts Phonecase
Support Packet Storm by grabbing gear! Available January 1, 2025!


polls ()

Figuring out how to manipulate a flaw to your advantage is at the core of security testing. Different attacks yield different data, but all vectors have their own interesting nuances to exploitation.


What is the most fun to exploit?

AnswersResults
Cross site scripting.0%
SQL injection.33%
Code execution / command injection.33%
Memory-related bugs.0%
Race conditions.0%
People.33%
storm watch (⇩)

2024-12-04: 1 news article added
2024-12-03: 25 files added
2024-11-10: 21 voting polls added

2024-11-30 (1732924800)

Temporary RSS feeds added.
Fixed BlueSky integration.
Fixed chat bug.
Minor JS and CSS updates.
...
[ View Full Changelog ]
grab gear (⇩)

Hat Hoodie Mousepad
Hat Hoodie Mousepad

Mug Shirts Phonecase
Mug Shirts Phonecase
Support Packet Storm by grabbing gear! Available January 1, 2025!
polls ()

Figuring out how to manipulate a flaw to your advantage is at the core of security testing. Different attacks yield different data, but all vectors have their own interesting nuances to exploitation.


What is the most fun to exploit?

AnswersResults
Cross site scripting.0%
SQL injection.33%
Code execution / command injection.33%
Memory-related bugs.0%
Race conditions.0%
People.33%
 About | Terms | Copyright | Privacy | BlueSky | X | Mastodon
 © 2024
All Rights Reserved Packet Storm Security, LLC
Hosting provided by: RokaSecurity