The pentester's Swiss knife

Android Botnet malicious applications

appshark: scan vulnerabilities in an Android app

AppShark Appshark is a static analysis tool for Android apps. Its goal is to analyze very large apps (Douyin currently has 1.5 million methods). Appshark supports the following features: JSON-based customized scanning rules to...

Supply Chain Attack WhatsApp Ban WhatsApp Russia

Your Code Is Not Safe: Malicious NPM Packages Are Deleting Files

Two malicious packages have been discovered in the NPM ecosystem, disguised as libraries for building bots and automated services using the WhatsApp Business API. Identified by researchers at Socket, these modules mimicked popular WhatsApp...

Linux Kernel Gaming Laptops

Linux 6.17 Kernel Gets a Performance Boost for Gaming Laptops

The new Linux 6.17 kernel introduces a unified standard for the so-called “performance button” increasingly found on gaming laptops. This key now has an assigned unique code—KEY_PERFORMANCE—allowing Linux systems to properly recognize it and...

DeerStealer Akira Ransomware Radix Ransomware BlackCat Leaders

Akira Ransomware Uses Intel Driver to Bypass Windows Defender

Akira ransomware attacks are growing ever more sophisticated: threat actors have begun exploiting a legitimate Intel CPU tuning driver to disable Windows’ built-in protections. The driver in question—rwdrv.sys, part of the ThrottleStop utility—is registered...