800 arrests after police dupe crime groups into using backdoored phones
An international operation that monitored an encrypted device company under control of the Federal Bureau of Investigation (FBI) and the...
An international operation that monitored an encrypted device company under control of the Federal Bureau of Investigation (FBI) and the...
In May 2021, a researcher tweeted about a new malware that hides itself inside Steam profile photos. Except for a...
"Moscow should not react to such statements until the United States is ready to seriously discuss the rules of conduct...
Nucleus Software Exports, an Indian financial software company has witnessed a major ransomware attack. The company that facilitates Indian banks...
The New South Wales Ministry of Health (NSW Health) has confirmed that it was impacted by a cyberattack involving the...
Id verification online platform Trulioo lands a $394 Million series D round of funding at a $1.75 Billion valuation after...
On April 14-15, 2021, Kaspersky technologies detected a wave of highly targeted attacks against multiple companies. Closer analysis revealed that...
Golang malware development framework IntroductionColdFire provides various methods useful for malware development in Golang. Most functions are compatible with both...
link is a command and control framework written in rust. Currently in beta. Introductionlink provides MacOS, Linux and Windows implants...
A large number of popular websites including Reddit, Spotify, PayPal, GitHub, gov.uk, CNN, and the BBC are currently facing problems...
Trojan Shield operation: The FBI and Australian Federal Police ran an encrypted chat platform that was used by crime gangs...
US officials announced to have recovered most of the $4.3 million ransom that Colonial Pipeline paid to the DarkSide ransomware...
RockYou2021, the largest password compilation of all time has been leaked on a popular hacker forum, it contains 8.4 billion...
Siloscape is a new strain of malware that targets Windows Server containers to execute code on the underlying node and...
Summary: net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic)...
Summary: libgrss through 0.7.0 fails to perform TLS certificate verification when downloading feeds, allowing remote attackers to manipulate the contents...
Summary: Monstra CMS through 3.0.4 has an incomplete "forbidden types" list that excludes .php (and similar) file extensions but not...
Summary: A buffer overflow vulnerability exists in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges...
Summary: An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block...
A visitor photographs a symbol of a cloud at the Deutsche Telekom stand the day before the CeBIT technology trade...
The US Department of Justice announced Monday that it recovered much of the ransomware payment that Colonial Pipeline paid to...
This week on Lock and Code, we’re presenting you something a little different. We’re telling you a story—with no guest...
When you think of the world of ethical hackers (white hat), malicious hackers (black hat), and hackers that flirt with...
Amazon smart device owners only have until June 8 to opt out of a new program that will group their...