Pocsuite – Remote Vulnerability Testing Framework

Scanning systems is very important when you are evaluating the security on your internal assets. One of the tools that can be used during a security assessment is Pocsuite.

Mimikittenz- A post-exploitation PowerShell Tool

mimikittenz is a post-exploitation powershell tool that utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes

Android.Fakebank.B Android Trojan Prevent Infected Systems from Calling Bank Support

Security researchers at Symantec alerting of a malware that was previously discovered in 2013. This malware is infecting android systems and called Android.Fakebank.B.

GOLANG – Trojan That Uses Twitter as a C&C server

Botnet

GoAT (Golang Advanced Trojan) is a trojan made in Go, using Twitter as a the C&C server. GoAT has some very unique and impressive capabilities

Euro 2016 Official App Exposes Users Sensitive Information

Euro 2016 Championship has not only attracted attention to football fans but also to information security professionals. According to report published by Wandera “Analysis of Euro 2016 Impact on Mobile Security and Usage”, the official application for UEFA Euro 2016

sems – Sandbox and Virtual Machine Detection Tool

sems is a good tool that can be used by malware researchers to verify if the existing virtual environment detected by malwares.

Cerber Ransomware Used to Attack Office 365 Users

icrosoft Office 365 users were targeted by a massive malicious attack. Cybercriminals used a RansomWare virus called Cerber that was distributed over emails and encrypted users’ files.