Hashdb-Ida – HashDB API Hash Lookup Plugin For IDA Pro
HashDB IDA PluginMalware string hash lookup Hash AlgorithmsClick Refresh Algorithms to pull a list of supported hash algorithms from...
HashDB IDA PluginMalware string hash lookup Hash AlgorithmsClick Refresh Algorithms to pull a list of supported hash algorithms from...
Threat actors are impersonating cybersecurity firm Proofpoint to trick victims into providing Microsoft Office 365 and Gmail credentials. Cybercriminals are...
Summary: Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service...
Summary: SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled. Reference Links(if available): https://github.com/no-security/sqlalchemy_test https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518 https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html https://access.redhat.com/errata/RHSA-2019:0984...
Summary: A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS...
Summary: A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS...
Summary: containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found...
A new Magecart group leverages a browser script to evade virtualized environments and sandboxes used by researchers. Malwarebytes researchers have...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
Event Trace Log file reader in pure Python etl-parser is a pure Python 3 parser library for ETL Windows log...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
The FBI issued a private industry notification (PIN) to warn of ransomware attacks that hit several tribal-owned casinos last year....
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...