Using WiFi connection probe requests to track users
Researchers at the University of Hamburg demonstrated that WiFi connection probe requests expose users to track. A group of academics...
Researchers at the University of Hamburg demonstrated that WiFi connection probe requests expose users to track. A group of academics...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2022-0847A flaw was found in the way the "flags" member of the...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
DOMDig is a DOM XSS scanner that runs inside the Chromium web browser and it can scan single page applications...
LockBit 2.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Ransomware gangs are actively exploiting CVE-2022-26134 remote code execution (RCE) flaw in Atlassian Confluence Server and Data Center. Multiple ransomware...
Data exfiltration utility for testing detection capabilities Description Data exfiltration utility used for testing detection capabilities of security products. Obviously...