Ezuri memory loader used in Linux and Windows malware
Multiple threat actors have recently started using the Ezuri memory loader as a loader to executes malware directly into the...
Multiple threat actors have recently started using the Ezuri memory loader as a loader to executes malware directly into the...
The US Federal Bureau of Investigation (FBI) issued a security alert warning private sector companies of Egregor ransomware attacks. The...
The Ryuk ransomware had a disruptive impact on multiple industries around the world, operators already earned more than $150 million....
Experts spotted the RokRat Trojan being used by North Korea-linked threat actors in attacks aimed at the South Korean government....
In a new phishing campaign, the offending emails arrive in inboxes with attached, password-protected zip archives containing Word documents. (Photo...
Malwarebytes recently received a report about a fresh spate of Bitcoin sextortion scam campaigns doing the rounds. Bitcoin sextortion scams...
On December 22, Germany’s third largest publisher fell victim to a cyberattack that affected systems in offices all around the...
Founder of DLBI data leak intelligence service Ashot Hovhannisyan spoke about the most large-scale database leaks in the Russian Federation...
Recently, Marijuana Business Daily has disclosed a data breach at Aurora Cannabis. The security incident compromised the credential information...
An expert who observed that messaging platform Telegram's "People Nearby" feature revealed risk of accurate user location, is now informed...
Cisco Talos researchers exposed multiple vulnerabilities in SoftMaker Office TextMaker that can be exploited by cyber attackers. These vulnerabilities in...
The National Security Agency is a US-based agency on which America highly relies on to collect and process foreign signals,...
A script that can see if an email address is valid in Office365. This does not perform any login attempts,...
SARENKA is an Open Source Intelligence (OSINT) tool which helps you obtaining and understanding Attack Surface. The main goal is...
How many of you got that call at the beginning of the pandemic to make your company’s workforce 100% capable...
An expert found multiple serious vulnerabilities in Fortinet’s FortiWeb web application firewall (WAF) that could expose corporate networks to hack....
The U.S. government is going to launch the ‘Hack the Army 3.0’ bug bounty program in collaboration with the HackerOne...
The US DoJ revealed that threat actors behind the SolarWinds attack have gained access to roughly 3% of the department’s...
WhatsApp is notifying users that starting February 8, 2021, they will be obliged to share their data with Facebook, leaving...
Google released an Android security update that addressed tens of flaws, including a critical Android remote code execution vulnerability. Google...
This post was authored by Hossein Jazi On December 7 2020 we identified a malicious document uploaded to Virus Total...
“What now? My farm is no longer working. Can you have a look, honey?” Like millions of other people my...
Previously, US President Donald Trump had accused China of malicious security incidents; security experts and officials have suspected China...
Juspay, the payment processor of prime online merchants like Amazon and Swiggy was hit by a massive data breach and...