WildPressure targets the macOS platform
New findings Our previous story regarding WildPressure was dedicated to their campaign against industrial-related targets in the Middle East. By...
New findings Our previous story regarding WildPressure was dedicated to their campaign against industrial-related targets in the Middle East. By...
A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific modules or...
GitDump dumps the source code from .git when the directory traversal is disabledRequirementsPython3 Tested onWindows Kali Linux What it doesDump...
Resecurity® HUNTER, cyber threat intelligence and R&D unit, identified a strong connection to a cloud hosting and IoT company servicing...
Microsoft rolled out KB5004945 emergency update to address the actively exploited PrintNightmare zero-day vulnerability (CVE-2021-34527) in Print Spooler service. Microsoft...
A hacker has leaked claims to have breached pro-Trump GETTR and leaked the private information of almost 90,000 members on...
Positive Technologies experts provide details about potential impact of a recently fixes command injection flaw in SonicWall NSM devices. Positive...
Summary: Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is...
Summary: Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Gnuplot). The supported version that is...
Summary: Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Filesystem). Supported versions that are affected...
Summary: Unspecified vulnerability in Oracle Sun Solaris 10 and 11.3 allows local users to affect confidentiality, integrity, and availability via...
Summary: Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of...
The official YouTube channel of Kaseya, the latest organization attacked by no less than the criminals behind REvil ransomware, released...
At 11:37 pm on the night of September 20, 2019, cybercriminals launched a ransomware attack against Northshore School District in...
Two weeks after the iphone wifi bug was found, the same cybersecurity analyst Carl Schou discovered a similar different case....
Sweden-based digital rights nonprofit Qurium Media has reported a targeted campaign of distributed denial-of-service (DDoS) attacks on Filipino media outlets...
On May 24th, WSSC Water witnessed a ransomware attack that incapacitated a portion of its network. WSSC Water has been...
One of the most popular fraud schemes involves buying or selling an account in online games. An attacker can offer...
Microsoft is alerting customers to upgrade their installations of PowerShell 7 as soon as possible to protect themselves against a.NET...
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can...
This project was created to research, build and test different memory injection detection use cases and bypass techniques. The agent...
Kaseya confirmed that the REvil supply-chain ransomware attack hit fewer than 60 of its customers and their customers. Software provider Kaseya...
Group-IB supported INTERPOL in its Operation Lyrebird that allowed to identify a threat actor presumably responsible for multiple attacks. Group-IB, one of the leading...
Taiwanese vendor QNAP addressed a critical flaw, tracked as CVE-2021-28809, that could be exploited to compromise vulnerable NAS devices. Taiwanese vendor...