pentesting

Threat actors abuse penetration testing tool for attacks

Threat actors abuse penetration testing tool for attacks

Brute Ratel C4 designed to avoid detection by AV and endpoint defences.
Juha Saarinen Jul 6 2022 12:05PM Security
NSW iVote system may have been vulnerable to voter fraud at election

NSW iVote system may have been vulnerable to voter fraud at election

Susceptible to Scytl flaw uncovered earlier this year.
Justin Hendry Nov 14 2019 12:21PM Security
Second flaw found in Swiss e-voting system

Second flaw found in Swiss e-voting system

NSW Electoral Commission satisfied iVote unaffected.
Justin Hendry Mar 25 2019 7:01AM Security
NSW Electoral Commission confirms iVote contains critical Scytl crypto defect

NSW Electoral Commission confirms iVote contains critical Scytl crypto defect

But declares it unaffected and safe for upcoming state election.
Justin Hendry Mar 13 2019 10:13AM Security
Crypto defect found in Swiss e-voting system

Crypto defect found in Swiss e-voting system

Same software that underpins NSW's iVote.
Justin Hendry Mar 12 2019 7:01PM Security
Tool helps multi-user pen tests

Tool helps multi-user pen tests

Beta launched.
Darren Pauli Dec 17 2013 5:01PM Security
Vic Govt open to 'catastrophic' attack, lacks intrusion detection

Vic Govt open to 'catastrophic' attack, lacks intrusion detection

Pen testers pwn.
Paris Cowan Nov 27 2013 2:00PM Security
Pen testing firm pulls DEF CON talk over Fed exclusion

Pen testing firm pulls DEF CON talk over Fed exclusion

Says DEF CON should 'encourage openness'.
Darren Pauli Jul 12 2013 2:02PM Security
Search phone calls for keywords with Metasploit

Search phone calls for keywords with Metasploit

Find passwords, company secrets in tapped conversations.
Darren Pauli Feb 6 2013 6:30AM Security
Metaspolit-like framework taps into 29M hacked passwords

Metaspolit-like framework taps into 29M hacked passwords

Open source Python pen test tool released.
Darren Pauli Jan 31 2013 12:31PM Security
Pentesting is not the only route

Pentesting is not the only route

“Almost all security breaches are completely unrelated to penetration issues"
Lee Farman Sep 5 2005 3:39PM Security

Log In

  |  Forgot your password?