SUPERNOVA, a backdoor found while investigating SolarWinds hack
While investigating the recent SolarWinds Orion supply-chain attack security researchers discovered another backdoor, tracked SUPERNOVA. The investigation of the SolarWinds...
While investigating the recent SolarWinds Orion supply-chain attack security researchers discovered another backdoor, tracked SUPERNOVA. The investigation of the SolarWinds...
Last week on Malwarebytes Labs we kept you updated on the SolarWinds attack, we warned about the special dangers that...
Trukno: Virtual Threat Intelligence Analyst to launch their Broad Beta Version on 22nd. Every second a new attack in cybersecurity...
FireEye, the cybersecurity firm responsible for finding out about the massive hacking campaign against the US government says that 50...
Posted by Moe Szyslak on Dec 21Rocket.Chat has fixed a server-side path traversal vulnerability that may be abused to write...
A sharpen version of CrackMapExec. This tool is made to simplify penetration testing of networks and to create a swiss...
Watcher is a Django & React JS automated platform for discovering new potentially cybersecurity threats targeting your organisation. It should...
Posted by houjingyi on Dec 21Video and POC here : https://www.youtube.com/watch?v=hAPkSGxh9H0 When you open a project in android studio, if...
Posted by Adan Alvarez on Dec 21Details ======= Subject: Local Privilege Escalation Product: SUPREMO by Nanosystems S.r.l. Vendor Homepage: https://www.supremocontrol.com/...
Tens of Al Jazeera employees were targeted in a cyber espionage campaign leveraging a zero-click iOS zero-day vulnerability to hack...
Flavor and fragrance producer Symrise is the last victim of the Clop ransomware gang that claims to have stolen 500...
Experts uncovered a massive fraud operation that used a network of mobile device emulators to steal millions of dollars from...
In June 2020, the hardware crypto wallet manufacturer Ledger suffered a data breach that exposed over 1 million email addresses....
The United States is witnessing major cyberattacks, multiple government departments’ agencies are being targeted including treasury and commerce departments, homeland...
Sploit is a Go package that aids in binary analysis and exploitation. The motivating factor behind the development of sploit...
Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.Options -q,...
This post includes the details of the COVID-19 themed attacks launched from December 6 – December 19, 2020. December 6...
NATO announced it is assessing its systems after the SolarWinds supply chain attack that impacted multiple US government agencies. NATO...
A number of organisations have been attacked by what has been chronicled as one of the most severe acts of...
After months of lockdown, this Christmas season has become even more special to people but fraudsters are also beginning...
Active Cypher: The company is built upon a socially responsible fabric, that provides information security for individuals and corporations...
Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process...
A bento (弁当, bentō) is a single-portion take-out or home-packed meal of Japanese origin. Bento Toolkit is a simple and...
The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks...