BlackMatter Ransomware Victim: hhcp[.]com
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
BeaconEye scans running processes for active CobaltStrike beacons. When processes are found to be running beacon, BeaconEye will monitor each...
Perform Google Dork search with Dorkify Google DorkingGoogle dorking is a hacker technique that uses Google Search to find security...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
Documents and personal details of residents of the small Swiss town Rolle, on the shores of Lake Geneva, were stolen...
VMware released security patches to address multiple vulnerabilities in vRealize Operations, including four high severity flaws. VMware addressed multiple vulnerabilities...
F5 has addressed more than a dozen severe vulnerabilities in its BIG-IP networking device, including one rated as critical severity...
Financially motivated threat actor FIN8 employed a previously undocumented backdoor, tracked as ‘Sardonic,’ in recent attacks. The financially motivated threat...
Summary: In Eclipse Californium version 2.0.0 to 2.6.4 and 3.0.0-M1 to 3.0.0-M3, the certificate based (x509 and RPK) DTLS handshakes...
Summary: In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary...
Summary: A CWE-306: Missing Authentication for Critical Function vulnerability exists which could cause a modification of device IP configuration (IP...
Summary: Improper Input Validation vulnerability exists in Modicon M241/M251 logic controllers firmware prior to V5.1.9.1 that could cause denial of...
Summary: Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (V5.0.0.7 and prior) which could cause Denial of Service when...
In August 2021, the website development company Imavex suffered a data breach that exposed 878 thousand unique email addresses. The...
Unfortunately there is a low correlation factor between what most people find the best browsers and what are the best...
Famously, Pinky and the Brain were a pair of animated mice that wanted to take over the world. Of course...
AvosLocker Ransomware SummaryVictim Name: Mauck & BakerMauck & Baker was recently locked by one of our partners. 1 North LaSalle...
AvosLocker Ransomware SummaryVictim Name: Coghlin Electrical ContractorsWe've locked Coghlin Electrical Contractors's network. 100 Prescott Street Worcester, MA 01605 infocoghlin.com SueMailmancoghlin.com...
AvosLocker Ransomware SummaryVictim Name: Moorfields NHS UK & DubaiMoorfields suffered a breach recently and they refused to pay. This is...
AvosLocker Ransomware SummaryVictim Name: SoftwareDesign Consulting GroupSoftwareDesign Consulting Group suffered a breach recently. If they refuse to negotiate, we will...