Newly Discovered ‘Tomiris’ Backdoor Linked to SolarWinds Attack Malware
Kaspersky security researchers have unearthed a new backdoor likely designed by the Nobelium advanced persistent threat (APT) behind last year's...
Kaspersky security researchers have unearthed a new backdoor likely designed by the Nobelium advanced persistent threat (APT) behind last year's...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Luxury retail company Neiman Marcus Group has announced this week that it has suffered a data breach that impacted customer...
Certify is a C# tool to enumerate and abuse misconfigurations in Active Directory Certificate Services (AD CS). @harmj0y and @tifkin_...
Recently a ransomware attack targeted a leading book supplier software, the attack interrupted regular functions of thousands of bookstores in...
In the latest Profero report - Senior Incident Responder Brenton Morris states that RansomeXX decryptors have failed to encrypt different...
Google rolled out urgent security updates to address two new actively exploited zero-day vulnerabilities in its Chrome browser. Google this...
Authorities in the United States charged a Turkish national for launching distributed denial-of-service (DDoS) assaults against a Chicago-based multinational hospitality...
A new malware named GriftHorse is said to have infected over 10 million Android cell phones. According to the research...
Threat actors could exploit a stored cross-site scripting (XSS) vulnerability in Apple AirTag product to lure users to malicious websites....
Download GhostEmperor’s technical details (PDF) While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster...
This repository contains some utilities for playing with PKINIT and certificates. The tools are built on minikerberos and impacket. Accompanying...
Security researchers devised a new attack method against iPhone owners using Apple Pay and Visa payment cards. Boffins from the...
14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties Original post @...
SharpML is a proof of concept file share data mining tool using Machine Learning in Python and C#. The tool...
Researchers at Zimperium have discovered an aggressive mobile premium services campaign with over 10 million victims all over the world....
Two-factor authentication is a great way to protect your online accounts, and we always recommend you turn it on. But...
Cybersecurity experts have discovered a new hacker group ChamelGang, which attacks institutions in ten countries around the world, including Russia....
Internet scammers are using Twitter bots to trick users into making PayPal and Venmo payments to accounts under their possession....
Within the last couple of days, Bandwidth.com has been the latest target of distributed denial of service attacks targeting VoIP...