SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data …
Tag:
Malware
-
-
BrowserPasswordSpamUS-CertWindows
Emotet Malware – one of the most destructive malware right now
by blackMOREby blackMOREEmotet continues to be among the most costly and destructive malware affecting SLTT governments. Its worm-like features result in rapidly spreading network-wide infection, which are difficult to combat. Emotet infections …
-
MonitoringNetwork TrafficPasswordSecuritySpamUS-CertWindows
Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
by blackMOREby blackMORERecommended best practices for mitigating this threat include rigorous credential and privileged-access management, as well as remote-access control, and audits of legitimate remote-access logs. While these measures aim to prevent …
-
Bugs (Software and Hardware)OthersSecurityTechnical Documentation
Check Point SandBlast protected users from a Zero-Day Microsoft Office Vulnerability
by blackMOREby blackMORENeil Armstrong, the great space explorer, once said “research is all about creating new knowledge.” And of course, with knowledge we are in a better position to predict, and thus …