Acer suffers a second data breach in a week
Tech giant Acer was hacked again in a few days, after the compromise of the servers in India, threat actors...
Tech giant Acer was hacked again in a few days, after the compromise of the servers in India, threat actors...
China-linked cyberespionage group LightBasin hacked mobile telephone networks around the world and used specialized tools to access calling records. A...
A tool which creates a spoof code signing to sign a file with a valid code signing certificate use the...
Zero-day exploit broker Zerodium announced it is looking for zero-day vulnerabilities in the Windows clients of ExpressVPN, NordVPN, and Surfshark....
Summary: Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40466, CVE-2021-40467. Reference...
Summary: Windows TCP/IP Denial of Service Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36953 CVSS Score (if available) v2: / MEDIUMAV:N/AC:L/Au:N/C:N/I:N/A:P v3: /...
Summary: Microsoft Exchange Server Denial of Service Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34453 CVSS Score (if available) v2: / MEDIUMAV:N/AC:L/Au:N/C:N/I:N/A:P v3:...
Summary: Windows HTTP.sys Elevation of Privilege Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26442 CVSS Score (if available) v2: / MEDIUMAV:L/AC:L/Au:N/C:P/I:P/A:P v3: /...
Summary: Storage Spaces Controller Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40478, CVE-2021-40488, CVE-2021-40489, CVE-2021-41345. Reference Links(if...
Trickbot (aka TrickLoader or Trickster), is a successor of the Dyre banking Trojan that was active from 2014 to 2016...
This blog post was authored by Jérôme Segura Although global e-commerce is continuing to grow rapidly, it seems as though...
LazyCSRF is a more useful CSRF PoC InstallationDownload the jar from LICENSEMIT LicenseCopyright (C) 2021 tkmruDownload lazyCSRF If you like...
Sentinel Labs experts have analyzed the new Karma ransomware and speculate it represents an evolution of the Nemty ransomware operation....
Despite promises made by the BlackMatter ransomware gang about which organizations and business types they would avoid, multiple US critical...
With some pests you hope they never recover from a blow. It’s almost too good to be true, but one...
Symantec spotted a previously unknown nation-state actor, tracked as Harvester, that is targeting telecommunication providers and IT firms in South...
𝚔𝚊𝚛𝚖𝚊 𝚟𝟸 is a Passive Open Source MODEsMODEExamples-ip bash karma_v2 -d <DOMAIN.TLD> -l <INTEGER> -ip-asn bash karma_v2 -d <DOMAIN.TLD> -l...
FBI, CISA, NSA have published a joint advisory about the operation of the BlackMatter ransomware gang and provides defense recommendations....
Trustwave’s SpiderLabs researchers have released a free decryptor for the BlackByte ransomware that can allow victims to recover their files....
This year, we had the honor to be selected for the thirty-first edition of the Virus Bulletin conference. During the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Modern Penetration testing and Red Teaming often requires to bypass common AV/EDR appliances in order to execute code on a...
The Uptycs Threat Research Team spotted a campaign in which the TeamTNT threat actors deployed a malicious container image on...
Experts discovered several unprotected installs of open source event monitoring solution Prometheus that may expose sensitive data. JFrog researchers have...