Supply Chain Attack Conducted by Darkside Operator
Mandiant researchers have identified a supply chain attack against a CCTV provider by a Darkside ransomware gang affiliate that has...
Mandiant researchers have identified a supply chain attack against a CCTV provider by a Darkside ransomware gang affiliate that has...
During a live chat, Apple CEO Tim Cook stated that Android has more malware than iOS and that "sideloading" mobile...
Russian President Vladimir Putin said that the US accusations against Russia, including cyber attacks and election interference, are groundless, the...
Security researchers have discovered an online database belonging to CVS Health which exposed over a billion records online.On March 21st,...
Ransomware groups are increasingly purchasing access to corporate networks from "vendors" who have previously placed backdoors on targets. Email is a...
Black Kingdom ransomware appeared on the scene back in 2019, but we observed some activity again in 2021. The ransomware...
This tool implements a userland exploit that was initially discussed by James Forshaw (a.k.a. @tiraniddo) - in this blog post...
This is a GUI for Volatility forensics tool written in PyQT5Prerequisites:1- Installed version of Volatility. 2- Install PyQT5. sudo apt-get...
The securWizCase experts found a major breach that affected the popular online retailer Cosmolog Kozmetik. WizCase’s security team, led by...
Russian national Oleg Koshkin was convicted for operating a “crypting” service used to obfuscate the Kelihos bot from antivirus software. Russian national Oleg...
UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV...
How AI is Transforming Data Governance? Consumers are becoming more aware of their rights, making data governance more relevant across...
Poland ‘s government announced that it was targeted by an ‘Unprecedented’ series of cyber attacks, hackers hit against institutions and...
Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an...
Summary: Running security scans against the SAN switch can cause config and secnotify processes within the firmware before Brocade Fabric...
Summary: Improper caller check vulnerability in Knox Core prior to SMR MAY-2021 Release 1 allows attackers to install arbitrary app....
Summary: The Traffic Router component of the incubating Apache Traffic Control project is vulnerable to a Slowloris style Denial of...
Summary: An improper access control vulnerability in genericssoservice prior to SMR JUN-2021 Release 1 allows local attackers to execute protected...
Summary: Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the...
Ukrainian law enforcement officials announced Wednesday that they had arrested several individuals involved in criminal activity committed by the Clop...
A billion data points, including the usernames and mobile phone numbers of customers have been siphoned off Alibaba websites by...
Twitter is potentially looking to add some new features to combat specific forms of abuse and / or aggravation on...
Following a joint operation by law enforcement agencies from Ukraine, South Korea, and the United States, multiple persons alleged to...
America's largest propane supplier, AmeriGas, has revealed a data breach that lasted ‘8-second’ but affected 123 employees and one US...