(IN)SECURE Magazine Issue #42 Released
June 30th, 2014 📅
(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. Table of contents:
June 30th, 2014 📅
(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. Table of contents:
June 30th, 2014 📅
The security team at the security firm Sucuri discovered a critical Remote Code Execution (RCE) flaw while analyzing some custom
June 28th, 2014 📅
Dradis is an open source framework to enable effective information sharing, specially during security assessments. It’s a tool specifically to
June 28th, 2014 📅
The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on
June 26th, 2014 📅
The critical vulnerability discovered by Pichaya Morimoto in the TimThumb WordPress plugin version 2.8.13, resides in its “Webshot” feature that,
June 25th, 2014 📅
Researchers from the Citizen Lab at the Munk School of Global Affairs at the University of Toronto and computer security
June 24th, 2014 📅
Codesake::Dawn is a source code scanner designed to review your code for security issues. Basically a static analysis security scanner
June 24th, 2014 📅
The biggest Internet giant Google is launching a new fork of OpenSSL, which they dubbed as BoringSSL, developed by its
June 23rd, 2014 📅
HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is
June 22nd, 2014 📅
HackPorts was developed as a penetration testing framework with accompanying tools and exploits that run natively on Mac platforms. HackPorts
June 21st, 2014 📅
Code Spaces, a code-hosting and software collaboration platform used by different organizations for project management and development needs, was forced
June 21st, 2014 📅
A team of researchers from the computer science department of the Columbia University have discovered a critical security problem in
June 19th, 2014 📅
The ArchAssault Project is an Arch Linux derivative for penetration testers, security professionals and all-around Linux enthusiasts. This means we
June 19th, 2014 📅
Hooker is an opensource project for dynamic analysis of Android applications. This project provides various tools and applications that can
June 19th, 2014 📅
The popular professional network, LinkedIn has left hundreds of millions of its users exposed to Man-in-the-Middle (MitM) attack due to
June 18th, 2014 📅
core feature of XML is the ability to define and validate document structure using schemas and document type lead to
June 17th, 2014 📅
SHODAN is a search engine that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some
June 12th, 2014 📅
Feedly is a very popular RSS feed service which is available for desktop, iOS and Android devices with around 15
June 10th, 2014 📅
OWASP Mantra is a collection of free and open source tools integrated into a web browser, which can become handy
June 7th, 2014 📅
A privilege escalation vulnerability has been identified in the widely used Linux kernel that could allow an attackers to take
June 6th, 2014 📅
ByWaf is a Web Application Penetration Testing Framework (WAPTF). It consists of a command-line interpreter and a set of plugins.
June 5th, 2014 📅
Remember OpenSSL Heartbleed vulnerability? Several weeks ago, the exposure of this security bug chilled the Internet, revealed that millions of
June 4th, 2014 📅
The bug (CVE-2014-3466) was independently discovered by Joonas Kuorilehto of security firm Codenomicon, the same security firm who discovered the
June 4th, 2014 📅
Shellter is a dynamic shellcode injection tool aka dynamic PE infector. It can be used in order to inject shellcode
Comments