Nefilm Ransomware Group Eyes for $1bn+ Revenue Companies
On Tuesday, Trend Micro released a case study analyzing Nefilim, a ransomware gang that the researchers believe is or was...
On Tuesday, Trend Micro released a case study analyzing Nefilim, a ransomware gang that the researchers believe is or was...
A framework that aids in creation of self-spreading software Requirementsgo get -u github.com/redcode-labs/Coldfire go get -u github.com/yelinaung/go-haikunator New in v....
SQL / SQLI tokenizer parser analyzer. For C and C++ PHP Python Lua Java (external port) (https://github.com/p0pr0ck5/lua-ffi-libinjection) (external port) See...
The beef producer JBS has admitted to have paid an $11 million ransom to the REvil ransomware gang after the...
Google this week addressed 14 vulnerabilities in the Chrome browser, including a zero-day flaw that has been exploited in the...
Russia-linked cyberspies breached the internal network of Dutch police in 2017 while the authorities were investigating the crash of the...
Microsoft uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow pods that are used to mine cryptocurrency. Microsoft researchers...
The Spanish Ministry of Labor and Social Economy (MITES) was hit by a cyberattack and is working to restore impacted...
Google’s June security bulletin addresses more than 90 vulnerabilities in Android and Pixel devices, including a Critical RCE (CVE-2021-0507). Google’s...
Until the information age, cookies were only known as a tasty but unhealthy snack that some people enjoyed, and others...
This patch Tuesday harvest was another big one. The Windows updates alone included seven zero-day vulnerability updates, two of them...
According to Cybernews, what appears to be the world's largest password collection, called RockYou 2021, has been leaked on a...
The Police of Uttarakhand, India claimed that the web racket has duped naïve investors with at least 250cr Rs by...
Navistar International Corporation, a maker of United States trucks and military vehicles confirmed that it was hit by a cyberattack...
Hyperkitty, a Django-based application responsible for providing a web interface for the popular open-source mailing list and newsletter management service...
It's a well-known fact that Apple’s devices are undoubtedly way safer than any other company’s products, however, in recent research...
A Red Team oriented simple HTTP & WebDAV server written in C# with functionality to capture Net-NTLM hashes. To be...
The ultimate scope gathering tool for HackerOne, Bugcrowd, and Intigriti by sw33tLie. Need to grep all the large scope domains...
Summary: OBottle 2.0 in \c\t.php contains an arbitrary file write vulnerability. Reference Links(if available): https://github.com/SomeBottle/OBottle/issues/7 CVSS Score (if available) v2:...
Summary: Out of bounds write in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a...
Summary: OBottle 2.0 in \c\g.php contains an arbitrary file download vulnerability. Reference Links(if available): https://github.com/SomeBottle/OBottle/issues/6 CVSS Score (if available) v2:...
Summary: The gtkui_conf_read function in src/interfaces/gtk/ec_gtk_conf.c in Ettercap 0.7.3, when the GTK interface is used, does not ensure that the...
Summary: 3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows the system to display active...
Back in 2016, we saw the emergence of a botnet mainstay called TrickBot. Initially observed by our Labs team spreading...