How hackers bypassed MFA with a $120 phishing kit – until a global takedown shut it down on March 6, 2026 Posted by Graham Cluley
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India on March 6, 2026 Posted by The Hacker News
Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT on March 6, 2026 Posted by The Hacker News
Posted in AI AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities on January 23, 2026 Bruce Schneier
Posted in Guest blog The MedusaLocker ransomware gang is hiring penetration testers on August 13, 2025 Graham Cluley
Posted in application development Episode 253: DevSecOps Worst Practices With Tanya Janca of We Hack Purple on October 4, 2023 Paul F. Roberts
Posted in Hacking Tools DataSurgeon – Extract Sensitive Information (PII) From Logs on March 20, 2023 Darknet
Posted in cybersecurity Cynet Offers Free Threat Assessment for Mid-sized and Large Organizations on February 18, 2020February 18, 2020 The Hacker News
Posted in automated penetration testing Evaluating Your Security Controls? Be Sure to Ask the Right Questions on January 20, 2020 The Hacker News
Posted in cyber security Broadening the Scope: A Comprehensive View of Pen Testing on January 16, 2020 The Hacker News
Posted in Cynet Cynet Free Visibility Experience – Unmatched Insight into IT Assets and Activities on June 12, 2019 The Hacker News
Posted in automated penetration testing Commando VM — Turn Your Windows Computer Into A Hacking Machine on March 29, 2019March 29, 2019 The Hacker News