NFT Collector Scammed into Buying Fake Banksy Bidding
A hacker compromised a site of famed street artist Banksy and sold an NFT (non-fungal token) of artist's art for...
A hacker compromised a site of famed street artist Banksy and sold an NFT (non-fungal token) of artist's art for...
A new large-scale DDoS attack carried out late in the evening on September 2 led to the system failure of...
Facebook-owned WhatsApp has been directed to pay a 225 million euros ($266 million) fine for violating the EU’s General Data...
An OSINT (Open Source Intelligence) software framework with an objective of making cyber investigations more convinient by implementing abstraction mechanisms...
Penelope is an advanced shell handler. Its main aim is to replace netcat as shell catcher during exploiting RCE vulnerabilities....
The development team behind the Jenkins server disclose a security breach, threat actors deployed a cryptocurrency miner on one of its...
The Ragnar Locker ransomware operators threaten to leak stolen data if the victims attempt to contact law enforcement agencies. The...
A police report revealed that the popular encrypted email service provider ProtonMail shared the IP address of a French activist with the...
A Russian man accused of being a member of the infamous TrickBot gang was arrested while trying to leave South...
Summary: The mintTokens function of a smart contract implementation for SunContract, an Ethereum token, has an integer overflow via the...
Summary: Wind River VxWorks 6.6, 6.7, 6.8, 6.9.3, 6.9.4, and Vx7 has Incorrect Access Control in IPv4 assignment by the...
Summary: Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component....
Summary: Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There...
Summary: Wind River VxWorks 6.6 through vx7 has Session Fixation in the TCP component. This is a IPNET security vulnerability:...
Summary: CVE-2021-39608 is an unrestricted file upload vulnerability impacting FlatCore-CMS version 2.0.7. An exploit was observed in open source and...
Last week on Malwarebytes Labs ProxyToken: another nail-biter from Microsoft ExchangeMacs turn on apps signed by Symantec, treat them as...
The growing threat of ransomware has been highlighted by NCC Group's Research Intelligence and Fusion Team (RIFT) analysis. Between January-March...
A critical remote code execution (RCE) flaw has been fixed in the popular NPM package "pac-resolver." Developer Tim Perry discovered the...
Various zero day vulnerabilities in home baby monitor could be compromised that lets threat actors hack into camera feed and...
Cybersecurity researchers from the Chinese information security firm Netlab Qihoo 360 reported that at the beginning of this year the...
MarkMonitor, a domain registrar, had left over 60,000 parked domains susceptible to domain hijacking.MarkMonitor, now part of Clarivate, is a...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...