Linux, MacOS Malware Hidden in Fake Browserify NPM Package
Over the course of the weekend, Sonatype's automated malware detection system spotted a serious exceptional malware sample published to the...
Over the course of the weekend, Sonatype's automated malware detection system spotted a serious exceptional malware sample published to the...
Major Russian banks are ready to take part in testing the digital ruble and have no doubt that it will...
Security researchers at Microsoft warned the organizations of a new phishing campaign, they have been tracking activity where contact forms...
A smartphone can "eavesdrop" on its owner, said information and computer security expert Sergei Vakulin. In an interview with Radio...
Forescout Research Labs has disclosed a new collection of DNS vulnerabilities in collaboration with JSOF, potentially impacting over 100 million...
Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and...
A script to test credentials against Active Directory Federation Services (ADFS), calculating the ADFS url of an organization and allowing...
FireEye published its M-Trend 2021 report based on the data collected during the investigation, 650 new threat groups were tracked...
FBI log into web shells that hackers installed on Microsoft Exchange email servers across the US and removed the malicious...
The Swedish Sports Confederation organization was compromised in 2017-18 by hackers working for Russian military intelligence, officials said. The Swedish...
Microsoft patch Tuesday security updates address four high and critical vulnerabilities in Microsoft Exchange Server that were reported by the...
Adobe has addressed security vulnerabilities in Adobe Photoshop, Adobe Digital Editions, Adobe Bridge, and RoboHelp. Adobe has fixed ten security...
A set of vulnerabilities has been found in the way a number of popular TCP/IP stacks handle DNS requests. Potentially...
A US diplomatic mission in Nigeria warns of a visa scam affecting Nigerian citizens looking to move to the United...
The UK’s Nationwide Cyber Safety Centre (NCSC) has published a new advisory warning that cybercriminals as well as Advanced Persistent...
Security researchers have discovered that over 500,000 Huawei smartphone users who inadvertently subscribe to premium mobile services have downloaded apps...
In recent weeks, a relatively sophisticated new malware downloader has emerged that, while not widely distributed yet, appears to be...
APKPure, one of the biggest alternative application stores outside of the Google Play Store, was tainted with malware this week,...
While analyzing the CVE-2021-1732 exploit originally discovered by the DBAPPSecurity Threat Intelligence Center and used by the BITTER APT group,...
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! Traitor packages up a bunch of...
Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of...
The exploit code for a remote code execution vulnerability affecting QNAP network-attached storage (NAS) devices that run the Surveillance Station...
Security experts disclosed nine flaws, collectively tracked as NAME:WRECK, affecting implementations of the DNS protocol in popular TCP/IP network communication...
An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based...