A week in security (December 21- December 27)
Last week on Malwarebytes Labs we warned our readers about not so festive social media scams, how Emotet returned just...
Last week on Malwarebytes Labs we warned our readers about not so festive social media scams, how Emotet returned just...
Broker Freedom Finance admitted the fact of hacking its internal network and stealing data leaks about 16,000 clients of the...
Although 2020 has been the worst year since 1945, as last year, this year we made a ranking with the...
Well, what a year it has been. I won’t waste your time by recapping the many, many difficulties that 2020...
Researchers discovered that the popular e-commerce app 21 Buttons was exposing private data for 100s of influencers across Europe. Researchers from...
On December 25th, Apple users started facing issues in iCloud sign-in in the early morning. The outage that lasted for...
UK police has arrested 21 malicious actors across the United Kingdom who were the part of nationwide cyber crackdown targeting...
Just a powershell scripts for auditing security with CIS BEST Practices Windows 10 and Window Server 2016 You just need...
Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump, filtering and manipulation via DSL language,...
The Burlington-based University of Vermont Health Network has finally admitted that ransomware was behind the October attack. In October, threat...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
White hat hacker could be a profitable profession, Cosmin Iordache earned more than $2M reporting flaws through the bug bounty...
SolarWinds released an updated advisory for the SuperNova malware discovered while investigating the recent supply chain attack. SolarWinds has released...
GoDaddy made the headlines for an initiative that is dividing cybersecurity community, it sent phishing messages offering bonuses to its...
Kaspersky Lab and Yandex have identified malicious code in browser extensions. Through them, attackers could gain access to the account...
TruKno’s ThreatBoard is a platform that helps security professionals uncover the root causes behind emerging cyber-attacks, Improving proactive defense postures.....
An API for analyzing & finding a person profile across +300 social media websites. It includes different string analysis and...
Scanning APK file for URIs, endpoints & secrets.InstallationTo install apkLeaks, simply: $ git clone https://github.com/dwisiswant0/apkleaks$ cd apkleaks/$ pip install -r...
Emotet is back on Christmas Eve, cybercrime operators are sending out spam messages to deliver the infamous Trickbot Trojan. Emotet...
REvil ransomware gang, aka Sodinokibi, hacked The Hospital Group and threatens to release before-and-after pictures of celebrity clients. The Hospital...
CrowdStrike released a free Azure security tool after it was notified by Microsoft of a failed attack leveraging compromised Azure...
The North Korea-linked Lazarus APT group has recently launched cyberattacks against at least two organizations involved in COVID-19 research. The...
On 24th December, E-Hacking News conducted an interesting interview with Mr. Narendra Bhati, a Bug Bounty Hunter/Ethical Hacker. He was...
Aura is a static analysis framework developed as a response to the ever-increasing threat of malicious packages and vulnerable code...