Up to date information on all the latest attack methods and how to test your network against them!
The Network: Security News Latest Security News from The Network
Cisco Reports First Quarter FY20 Earnings
on November 13, 2019 at 8:15 pm
Cisco Reports First Quarter FY20 EarningsMore RSS Feed: newsroom.cisco.com/rss-feeds ...
Securing your future by innovating today
on November 5, 2019 at 8:00 pm
As you're innovating to build your future, we're innovating to keep it secure. More RSS Feed for Cisco: newsroom.cisco.com/rss-feeds ...
Secureworks Blog - threats-and-defenses Insights from our experts about the ever-evolving cybersecurity community
State of the [BRONZE] UNION Snapshot
by Counter Threat Unit™ Research Team on February 27, 2019 at 12:00 am
State of the [BRONZE] UNION SnapshotThe BRONZE UNION threat group focuses on espionage and targets a broad range of organizations and groups using a variety of tools and methods. The BRONZE UNION threat group focuses on espionage and targets a broad range of organizations and groups using a variety […]
Cloud Container Security Best Practices
by Counter Threat Unit™ Research Team on December 6, 2018 at 12:00 am
Cloud Container Security Best PracticesContainers can reduce complexity, ensure continuity, and add layered security. However, they can also introduce risk without sufficient security controls and processes.Containers can reduce complexity, ensure continuity, and add layered security. However, they […]
Lazy Passwords Become Rocket Fuel for Emotet SMB Spreader
by Mike McLellan on November 19, 2018 at 12:00 am
Lazy Passwords Become Rocket Fuel for Emotet SMB SpreaderPopular downloader malware highlights the dangers of using easy-to-guess passwordsPopular downloader malware highlights the dangers of using easy-to-guess passwords.
Finding a Weak Link in the Chain
by Barry Hensley on October 11, 2018 at 12:00 am
Finding a Weak Link in the ChainWhile supply-chain attacks pose serious risks, many can be avoided or mitigated by focusing on a defense-in-depth approach and basic security best practices. While supply-chain attacks pose serious risks, many can be avoided or mitigated by focusing on a […]
CyberPunk Madness and Obsession on the Electronic Frontier
NSA Software Reverse Engineering Framework: Ghidra
by CyberPunk on March 6, 2019 at 3:58 am
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end...
Semi-Automated Network Penetration Testing Framework: Legion
by CyberPunk on March 5, 2019 at 11:31 pm
Legion, a fork of SECFORCE’s Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and...
Graphical User Interface for Metasploit Meterpreter and Session Handler: Kage
by CyberPunk on March 5, 2019 at 10:35 pm
Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads. For now it only supports windows/meterpreter &...
Automated Dynamic Application Penetration Testing: ADAPT
by CyberPunk on March 5, 2019 at 9:51 pm
ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed, and confidence in penetration testing efforts....