article thumbnail

Inside TeraLeak: Exploring Thousands of Terabytes of Apple’s Hidden iOS Prototypes

Penetration Testing

Data collected from the servers of Apple TestFlight service between 2012 and 2015 has been leaked online.

article thumbnail

Patch Up Your OpenOffice: Four Vulnerabilities You Don’t Want to Ignore

Penetration Testing

This versatile suite, available in... The post Patch Up Your OpenOffice: Four Vulnerabilities You Don’t Want to Ignore appeared first on Penetration Testing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Stop Ransomware: Breach Prevention vs. Cobalt Strike Backdoor

Security Boulevard

With a year-on-year increase of over 161% , malicious usage of cracked versions of Cobalt Strike (a legitimate penetration test tool) is skyrocketing. Developed in 2012 to give pen testers and red teams the capability to conduct hard-to-spot test attacks, Cobalt Strike is designed to be dynamic and evasive.

article thumbnail

Google provides rules to detect tens of cracked versions of Cobalt Strike

Security Affairs

Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named ‘Beacon’ on the victim machine. Researchers at Google Cloud identified 34 different hacked release versions of the Cobalt Strike tool in the wild.

article thumbnail

Cobalt Strike – A Common Tool in the Arsenal of Cybercriminals

Heimadal Security

Intel 471 researchers explored the abuse of Cobalt Strike, a threat emulation software released in 2012 which can be used to deploy beacons on systems to simulate cyberattacks and test network defenses.

article thumbnail

DNA testing company fined after customer data theft

Malwarebytes

What happened in the 2021 breach When DDC acquired Orchid Cellmark, a British company also in the DNA testing industry, as part of its business expansion in 2012, the company didn't know that it also inherited legacy databases that kept personally identifiable information (PII) in plain text form.

article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

In 2012, the US government added Shevlyakov to Entity List, a ban list for procuring and delivering export-restricted items to Russia. In May 2020, Shevlyakov used one of his front companies to buy a licensed copy of the penetration testing platform Metasploit Pro. ” continues the press release.