logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Understanding Partial File System Extraction: What Data Can and Cannot be Accessed on iOS 15.6-16.1.2 Devices
  • ChatGPT happy to write ransomware, just really bad at it
  • Microsoft Defender mistakenly tagging URLs as malicious
  • Microsoft planning to block outdated Exchange servers
  • 3CX Desktop Attack: Sophos Customer Information

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-1583 (linux_kernel) 24 March 2023
  • CVE-2023-26864 (smplredirectionsmanager) 24 March 2023
  • CVE-2023-25350 (faveo_helpdesk) 24 March 2023
  • CVE-2023-22812 (sandisk_privateaccess) 24 March 2023
  • CVE-2023-21079 (android) 24 March 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Pickl3 – Windows Active User Credential Phishing Tool

Posted on 14 March 2020

From kitploit.com

Operational Usage – 1
Nowadays, since the operating system of many end users is Windows 10, we cannot easily steal account information with Mimikatz-like projects like the old days. Using Pickl3, you can try to steal the account information of the active user without escalating the privileges.

Read more…

Posted in News

Post navigation

Previous post: How Can The Coronavirus (COVID-19) Disrupt Cybersecurity Operations?
Next post: T-Mobile Offering Unlimited Smartphone Data, Extra Hotspot Data and Free International Calls to Some Areas Amid Coronavirus Outbreak
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.