Sprite Spider Emerging as One of The Most Destructive Ransomware Threat Actors
Recently, two CrowdStrike cybersecurity leads during a Cyber Threat Intelligence Summit at the SANS – Senior Security Researcher Sergei Frankoff, and Senior...
Recently, two CrowdStrike cybersecurity leads during a Cyber Threat Intelligence Summit at the SANS – Senior Security Researcher Sergei Frankoff, and Senior...
Not content with the beating it laid down in January, 2021 continues to deliver with an unpatched zero-day exposure in...
InsightVM and Nexpose customers can now harness the power of the Metasploit community to assess their exposure to the latest...
Description: Can you encrypt fast enough? So lets get into it. Start the instance for this challenge and visit the...
"linux-chrome-recon" is a Information gathering tool used to enumerate all possible data about an user from Google-Chrome browser from any...
Open Cloud Security Posture Management, OpenCSPM, is an open-source platform for gaining deeper insight into your cloud configuration and metadata...
Experts warn that the recently discovered heap-based buffer overflow bug in Linux SUDO also impacts the latest version of Apple...
The global leader of embedded system software Wind River Systems discloses a data breach that resulted in the theft of...
Cyber Defense Magazine February 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 108 pages of...
CloudSEK has discovered a post on a well-known database sharing forum advertising the PII of 500,000 Indian citizens. While the...
Summary: An issue was discovered in the aovec crate through 2020-12-10 for Rust. Because Aovec does not have bounds on...
Summary: An issue was discovered in the rusb crate before 0.7.0 for Rust. Because of a lack of Send and...
Summary: An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method...
Summary: Some parsing functions in the affected product do not check the return value of malloc and the thread handling...
Summary: The affected product has uncontrolled resource consumption issues, which may allow an attacker to cause a denial-of-service condition on...
Back in the fall of 2020 threat actors started to massively exploit a vulnerability in the no-longer maintained Magento 1...
The community of British Mensa, which is popularly known for its people with high IQs, they have failed to...
Disconnecting Russia from the global network is possible, but the authorities have a plan of action in this case, said...
Researchers at ESET found that NoxPlayer's latest updated mechanism, which is an android emulator for macOS and Windows, was attacked...
The outsourcing company responsible for NHS Test and Trace system in the UK confirmed this week that it was targeted...
Recently the US FBI has noted an increase in phone calls that usually spoof the Bureau’s telephone number. The actors...
Uroboros is a GNU/Linux monitoring tool focused on single processes. While utilities like top, ps and htop provide great overall...
Burp Suite extension for extracting metadata from files Currently supported documents: PDF DOCX PPTX XLSX The project created at Jetbrains...
ESET experts uncovered a previously undocumented piece of malware that had been observed targeting high-performance computing clusters (HPC). ESET analyzed...