Cybersecurity

Muddled Libra Hackers Using Pentesting Tools To Gain Admin Access

Threat actors use pentesting tools to identify vulnerabilities and weaknesses in target systems or networks. These tools provide a simulated environment for testing potential attack vectors that allow threat actors to exploit security gaps and gain unauthorized access.  By using pentesting tools, threat actors can assess the effectiveness of their methods and refine their strategies […]

Cybersecurity

Subdominator: Open-source tool for detecting subdomain takeovers – Help Net Security

Subdominator is a dependable and fast open-source command-line interface tool to identify subdomain takeovers. It boasts superior accuracy and reliability, offering improvements compared to other tools. “Initially, Subdominator was created internally because all the current subdomain takeover tools had gaps in their functionality. No tool had a complete set of accurate service fingerprints or features. […]