Less popular, but very effective, Red-Teaming Tool BRc4 used in attacks in the wild
Threat actors are abusing legitimate adversary simulation software BRc4 in their campaigns to evade detection. Researchers from Palo Alto Networks...
Threat actors are abusing legitimate adversary simulation software BRc4 in their campaigns to evade detection. Researchers from Palo Alto Networks...
NCSC urges organisations to prepare for the long haul on Russia-Ukraine UK organisations offered guidance on maintaining cyber security staff...
Brendan Carr, the commissioner of the FCC (Federal Communications Commission), called on the CEOs of Apple and Google to remove...
Hive ransomware operators have improved their file-encrypting module by migrating to Rust language and adopting a more sophisticated encryption method....
Two insiders and an accomplice were indicted on Tuesday for multiple counts of fraud. According to documents unsealed by the...
Researchers from ReversingLabs discovered tens of malicious NPM packages stealing data from apps and web forms. Researchers from ReversingLabs discovered...
Iran’s Fars News Agency reported that a massive cyberattack hit operating systems and servers of the Tel Aviv Metro. Iran’s...
The Cyber Police of Ukraine arrested nine members of a cybercriminal gang that has stolen 100 million hryvnias via phishing...
Threat actors compromised the Twitter and YouTube accounts of the British Army to promote online crypto scams. The Twitter and...
The vulnerability disclosure platform HackerOne has revealed that one of their staff members had improperly accessed security reports for personal...
AstraLocker ransomware operators told BleepingComputer they’re shutting down their operations and are releasing decryptors. AstraLocker ransomware operators told BleepingComputer they’re...
Google addressed a high-severity zero-day Chrome vulnerability actively exploited in the wild, it is the fourth zero-day patched in 2022....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Threat actors claim to have breached a database belonging to Shanghai police and stole the data of a billion Chinese...
The development team behind the Django Project has addressed a high-severity SQL Injection flaw in its framework. Django is a...
A new bill entered into both the House of Representatives and the Senate proposes the strongest Federal data privacy protections...
Bug bounty platform HackerOne disclosed that a former employee improperly accessed security reports submitted to claim additional bounties The vulnerability...
The Threat Report Portugal: Q2 2022 compiles data collected on the malicious campaigns that occurred from March to June, Q2,...
US Critical Infrastructure Security Agency (CISA) adds CVE-2022-26925 Windows LSA flaw to its Known Exploited Vulnerabilities Catalog. In May the...
Jenkins security team disclosed tens of flaws affecting 29 plugins for the Jenkins automation server, most of them are yet...
Microsoft announced that the Windows worm Raspberry Robin has already infected the networks of hundreds of organizations. Raspberry Robin is...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
Google Project Zero states that in H1 2022 at least half of zero-day issues exploited in attacks were related to...
This is a transcription of an interview I had at Iran International broadcaster, I discussed about the role of social...