Facebook launches $2m suit against alleged phishing, hacking sites

Facebook is using trademark law to target the operators of sites that imitate or target Facebook and Instagram sites. Continue reading Facebook launches $2m suit against alleged phishing, hacking sites

Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak

Forensic analysis shows a Chinese APT using Equation Group hacking tools at least a year before Shadow Brokers dumped its cache in April 2017. Continue reading Chinese Spies Stole NSA Cyberweapons Long Before Shadow Brokers Leak

Chinese hackers accessed NSA hacking tools before Shadow Brokers leak

By Ryan De Souza
Chinese hackers then used NSA’s hacking tools and technology to target American allies. Symantec researchers have discovered that in 2016, Chinese intelligence managed to repurpose hacking tools used by the National Security Agency (NS… Continue reading Chinese hackers accessed NSA hacking tools before Shadow Brokers leak

SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells

SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place.

List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, a… Continue reading SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells