Ragnar Locker ransomware leaked data stolen from ADATA chipmaker
The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more...
The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more...
Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the importance of...
Remember when we told you to patch your VPNs already? I hate to say “I told you so”, but I...
Earlier this month, Schneider Electric, a global supplier of energy and automation digital solutions published a security advisory for its...
After two months of break, a Middle Eastern advanced persistent-threat (APT) organization has resurfaced and is targeting government institutions in...
Squalr Official Website Join us on our Discord Channel Squalr is performant Memory Editing software that allows users to create...
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps. Using raw RDP...
The US National Security Agency (NSA) released guidance for securing Unified Communications/Voice and Video over IP Systems (VVoIP). NSA last...
The British intelligence agency MI5 seized Boris Johnson ‘s phone over concerns related to the availability of his number online...
Jaroslaw Kaczynski, the leader of the Poland Law and Justice party, blames Russia for the recent cyberattack targeting top Polish politicians. Jaroslaw...
Summary: ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows ntpkeygen to generate keys with '#' characters....
Summary: An improper free of uninitialized memory can occur in DIAG services in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile...
Summary: Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or...
Summary: A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on...
Summary: A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on...
Summary: Key exchange without entity authentication in the Intel(R) Security Library before version 3.3 may allow an authenticated user to...
Last week on Malwarebytes Labs: How to delete your Instagram account.Working from home? You’re probably being spied on.Another one bites...
Ransomware attacks are on a different scale this year, with major attacks not just dismantling the business and management of...
Volkswagen announced that a massive data breach exposed the personal information of over 3.3 million customers after one of its...
In the recent analysis, experts discovered that the digital credit card skimming ecosystem evolves as experts identify new players, tooling,...
Experts analyzed how often children encounter cyber incidents in the online space. It turned out that every fifth child has...
Recorded Future, a US security firm, revealed a cyber espionage campaign linked to a suspected Chinese state-sponsored threat activity group,...
The Russian government wants to create a single video surveillance system that will unite smart cameras in Russian cities. The...
This project is a PoC code to use Pass-the-Hash for authentication on a local Named Pipe user Impersonation. There also...