Microsoft: web shell attacks have doubled over the past year
Microsoft’s Detection and Response and 365 Defender teams are sounding the alarm that the number of observed attacks using web...
Microsoft’s Detection and Response and 365 Defender teams are sounding the alarm that the number of observed attacks using web...
In our last blog, Barcode Scanner app on Google Play infects 10 million users with one update, we wrote about...
Threat actors involved in tech support scams have been running a browser locker campaign from November 2020 until February 2021...
Two former college graduates are in a lot of trouble after breaking into other students’ accounts and stealing sensitive personal...
 Koo, a home-grown microblogging platform has come under the scanner after a French ethical hacker known by the moniker Elliot...
 In recent years, the threat from Ransomware has grown enormously. The ransomware attacks have started to threaten more web applications,...
Please Note - This Program Do Not Store Passwords In Any Form And All The Passwords Are Generated Locally Inside...
With this proyect we will be able to handle the data of the victims we obtain with Baphomet Ransomware. BaphoDashBoard...
Researchers at TIM’s Red Team Research discovered a zero-day vulnerability in IBM InfoSphere Information Server. Today, TIM’s Red Team Research...
Researchers from Microsoft are warning that the number of monthly web shell attacks has doubled since last year. Microsoft reported...
Security expert Dhiraj Mishra analyzed the popular instant messaging app Telegram and identified some failures in terms of handling the...
The fresh release of the Latin American Lampion trojan was updated with a new C2 address. Lampion trojan disseminated in...
An expert released a free decryption tool for the Avaddon ransomware, but operators quickly updated malware code to make it...
Lookout researchers provided details about two Android spyware families employed by an APT group tracked as Confucius. Researchers at mobile...
Summary: In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook...
Summary: Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap...
Summary: A Cross-Site Request Forgery (CSRF) issue in the NextGEN Gallery plugin before 3.5.0 for WordPress allows File Upload and...
Summary: In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to...
Summary: An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced. Reference Links(if...
Often the most brilliant ideas are the most simple. The hard part is being the first one to come up...
 Researchers at cybersecurity firm Lookout have published information on two recently discovered Android spyware families utilized by an advanced persistent...
Over the past weeks, WhatsApp messenger has started losing millions of users. They migrate to Telegram. In mid-January, almost 25...
The Central Bank of the Russian Federation summed up the results of the cyber exercises held in November-December 2020, designed...
 Iran, one of the resourceful countries in Western Asia in terms of weapons and cyber intelligence has resumed its cyberespionage...