FileWall, a Content Disarm and Reconstruction Solution for Microsoft 365 by Odix
In recent months, there has been an exponential surge in malware attacks. According to the checkpoint, the last quarter itself...
In recent months, there has been an exponential surge in malware attacks. According to the checkpoint, the last quarter itself...
For more than three years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of...
DeepBlueCLI - a PowerShell Module for Threat Hunting via Windows Event Logs Eric Conrad, Backshore Communications, LLC deepblue at backshore...
Web shell analyzer is a cross platform stand-alone binary built solely for the purpose of identifying, decoding, and tagging files...
There are many potential causes of security breaches, including malicious attacks, system glitches, equipment failures, software bugs, and zero days....
In May 2020, the online marketplace for independent artists Minted suffered a data breach that exposed 4.4M unique customer records...
We had a very busy week at Malwarebytes Labs. We offered advice on Google’s patch for an actively exploited zero-day...
Despite the funding cuts caused by the pandemic crisis, companies around the world are going to hire more and more...
A new variant of the Mirai botnet, Katana is being identified recently by the Avira Protection Lab. The botnet is...
The Trident project is an automated password spraying tool developed to meet the following requirements: the ability to be deployed...
For a list of functions, their usage, and more, check out https://powerzure.readthedocs.ioWhat is PowerZure?PowerZure is a PowerShell project created to...
A Content Security Policy is a protocol that allows a site owner to control what resources are loaded on a...
JM Bullion, the leading online bullion dealer in the United States, has disclosed a data breach, hackers stole customers’ credit...
The UK Information Commissioner’s Office fined US hotels group Marriott over the 2018 data breach that affected millions of customers...
Japan’s Nuclear Regulation Authority (NRA) issued a warning of temporary suspension of its email systems, likely caused by a cyber...
The Maze ransomware operators are shutting down their operations for more than one year the appeared on the threat landscape...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A threat actor is offering for sale account databases containing an aggregate total of 34 million user records stolen from...
According to details Kaspersky released to the media, the new wave in the U.S. was detected Oct. 29 and targeted...
 University of Vermont's health network suffered a cyberattack, which has impacted its network infrastructure. The attack has hit six Vermont...
This project allows you to easily spin up Active Directory labs in Azure with domain-joined workstations, Windows Event Forwarding, Kibana,...
Collection of PowerShell functions a Red Teamer may use to collect data from a machine or gain access to a...
In August 2109, a data breach from the Spanish online pharmacy Promofarma appeared for sale on a dark web marketplace....
 Lazada, a Singapore firm owned by e-commerce company Alibaba, suffered a hacking attack that cost more than one million accounts....