CNA legal filings lift the curtain on a Phoenix CryptoLocker ransomware attack
Two months after fully restoring its systems, CNA Financial, the leading US insurance company that was attacked by a group...
Two months after fully restoring its systems, CNA Financial, the leading US insurance company that was attacked by a group...
The Dutch police announced that they arrested two Dutch citizens, aged 24 and 15, for developing and selling phishing panels....
In June—July, regular exercises on the stability of the Runet were held. This time the possibility of working in conditions...
Several major websites faced outages on Thursday due to a glitch in Akamai Technologies Inc's (AKAM.O) systems, the second widespread...
Two new vulnerabilities, one in Windows and the other in Linux, were discovered on Tuesday, allowing hackers with a presence...
A detailed warning concerning almost 13 malware samples associated with Pulse Secure operated devices has been issued by the Cybersecurity...
Following a breach, user IDs and passwords for the Tokyo Olympic ticket gateway were released on a leak website, a...
In0ri is a defacement detection system utilizing a image-classification convolutional neural network. IntroductionWhen monitoring a website, In0ri will periodically take...
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email...
Summary: Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory...
Summary: There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file...
Summary: LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with...
Summary: Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When...
Summary: curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS...
In August 2019, Audio USA suffered a data breach after a vendor left data unsecured and exposed on the internet....
Doxing (or doxxing) is in the news again, for an absolutely shocking story that ended with a man’s death caused...
A very serious security flaw in immensely popular printer drivers has been disclosed and it could affect many millions of...
On July 18, a group of 17 newspaper and media organizations—aided by Amnesty International’s Security Lab and the research group...
A citizen of Sweden was sentenced to 15 years in prison for manipulating a cryptocurrency scam claiming to pay investors...
On Saturday 10th of July, just after a cyber interruption in IRNA's computing devices, the official IRNA media outlet announced...
Smartphones, unlike PCs, involve a range of radios – generally cellular, Wi-Fi, Bluetooth, and Near Field Communication (NFC) – that...
The case of the infamous spyware Pegasus has taken the world by storm, with news revealing its unlawful use infringing...
Have you ever wanted a simple, easy and stealth bypass for multiple classes of security products? pstf^2 (pronounced pstf-square) is...
Beanshooter is a command line tool written in Java, which helps to identify common vulnerabilities on JMX endpoints.IntroductionJMX stands for...