Posts

Politics & Governance
John Gilmore Leaves the EFF Board, Becomes Board Member Emeritus

John Gilmore Leaves the EFF Board, Becomes Board Member...

Since he helped found EFF 31 years ago, John Gilmore has provided leadership and...

Exploits
SysFlow - Cloud-native System Telemetry Pipeline

SysFlow - Cloud-native System Telemetry Pipeline

This repository hosts the documentation and issue tracker for all SysFlow projects.Quick...

Latest Threats
Threat Actors Abuse Discord to Push Malware

Threat Actors Abuse Discord to Push Malware

The platform’s Content Delivery Network and core features are being used to send...

Latest Threats
Cisco SD-WAN Security Bug Allows Root Code Execution

Cisco SD-WAN Security Bug Allows Root Code Execution

The high-severity bug, tracked as CVE-2021-1529, is an OS command-injection flaw.

Exploits
SubCrawl - A Modular Framework For Discovering Open Directories, Identifying Unique Content Through Signatures And Organizing The Data With Optional Output Modules, Such As MISP

SubCrawl - A Modular Framework For Discovering Open Directories,...

SubCrawl is a framework developed by Patrick Schläpfer, Josh Stroschein and Alex...

Latest Threats
REvil Servers Shoved Offline by Governments – But They’ll Be Back, Researchers Say

REvil Servers Shoved Offline by Governments – But They’ll...

A multi-country effort has given ransomware gang REvil a taste of its own medicine...

Latest Threats
FIN7 Lures Unwitting Security Pros to Carry Out Ransomware Attacks

FIN7 Lures Unwitting Security Pros to Carry Out Ransomware...

The infamous Carbanak operator is looking to juice its ransomware game by recruiting...

Latest Threats
Ransomware Sinks Teeth into Candy-Corn Maker Ahead of Halloween

Ransomware Sinks Teeth into Candy-Corn Maker Ahead of Halloween

Chicago-based Ferrara acknowledged an Oct. 9 attack that encrypted some systems...

Exploits
PortBender - TCP Port Redirection Utility

PortBender - TCP Port Redirection Utility

PortBender is a TCP port redirection utility that allows a red team operator to...

Politics & Governance
Police Can’t Demand You Reveal Your Phone Passcode and Then Tell a Jury You Refused

Police Can’t Demand You Reveal Your Phone Passcode and...

The Utah Supreme Court is the latest stop in EFF’s roving campaign to establish...

Latest Threats
Why is Cybersecurity Failing Against Ransomware?

Why is Cybersecurity Failing Against Ransomware?

Hardly a week goes by without another major company falling victim to a ransomware...

Politics & Governance
On Global Encryption Day, Let's Stand Up for Privacy and Security

On Global Encryption Day, Let's Stand Up for Privacy and...

At EFF, we talk a lot about strong encryption. It’s critical for our privacy and...

Exploits
PEASS-ng - Privilege Escalation Awesome Scripts SUITE new generation

PEASS-ng - Privilege Escalation Awesome Scripts SUITE new...

Basic TutorialHere you will find privilege escalation tools for Windows and Linux/Unix*...

Latest Threats
Gigabyte Allegedly Hit by AvosLocker Ransomware

Gigabyte Allegedly Hit by AvosLocker Ransomware

If AvosLocker stole Gigabyte's master keys, threat actors could force hardware to...

Latest Threats
TA551 Shifts Tactics to Install Sliver Red-Teaming Tool

TA551 Shifts Tactics to Install Sliver Red-Teaming Tool

A new email campaign from the threat group uses the attack-simulation framework...

Latest Threats
U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts Warn

U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts...

Meanwhile, Zerodium's quest to buy VPN exploits is problematic, researchers said.

Latest Threats
Geriatric Microsoft Bug Exploited by APT Using Commodity RATs

Geriatric Microsoft Bug Exploited by APT Using Commodity...

Disguised as an IT firm, the APT is hitting targets in Afghanistan & India, exploiting...

Politics & Governance
Crowd-Sourced Suspicion Apps Are Out of Control

Crowd-Sourced Suspicion Apps Are Out of Control

Technology rarely invents new societal problems. Instead, it digitizes them, supersizes...

Latest Threats
VPN Exposes Data for 1M Users, Leading to Researcher Questioning

VPN Exposes Data for 1M Users, Leading to Researcher Questioning

Experts warn that virtual private networks are increasingly vulnerable to leaks...

Politics & Governance
Why Is It So Hard to Figure Out What to Do When You Lose Your Account?

Why Is It So Hard to Figure Out What to Do When You Lose...

We get a lot of requests for help here at EFF, with our tireless intake coordinator...

Politics & Governance
Victory! Oakland’s City Council Unanimously Approves Communications Choice Ordinance

Victory! Oakland’s City Council Unanimously Approves Communications...

Oakland residents shared the stories of their personal experience; a broad coalition...

Exploits
Limelighter - A Tool For Generating Fake Code Signing Certificates Or Signing Real Ones

Limelighter - A Tool For Generating Fake Code Signing Certificates...

A tool which creates a spoof code signing certificates and sign binaries and DLL...

Exploits

NTFSTool - Forensics Tool For NTFS (Parser, MTF, Bitlocker,...

NTFSTool is a forensic tool focused on NTFS volumes. It supports reading partition...

Exploits
Metabadger - Prevent SSRF Attacks On AWS EC2 Via Automated Upgrades To The More Secure Instance Metadata Service V2 (IMDSv2)

Metabadger - Prevent SSRF Attacks On AWS EC2 Via Automated...

Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here