Ryuk ransomware develops worm-like capability
The French government’s computer emergency readiness team, that’s part of the National Cybersecurity Agency of France, or ANSSI, has discovered...
The French government’s computer emergency readiness team, that’s part of the National Cybersecurity Agency of France, or ANSSI, has discovered...
As per the report by Egress, 95% of cybersecurity experts believe company and client data in e-mails is at risk....
On October 29, 2020, the Wizcase CyberResearch Team which was lead by Ata Hakcil has discovered that the server ‘Elasticsearch’...
Security experts from Cybernews have discovered a massive data breach which is directly linked to the millions of VPN user....
Google has affirmed that a Google Voice malfunction that had impacted the majority of telephone service users this month was...
The database contains email addresses, passwords and usernames of Russian users. This information can be used by hackers to obtain...
A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone...
OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security Scanner. Note: AWSS is the older name...
French multinational dairy products corporation Lactalis discloses cyberattack, but claimed that had no evidence of a data breach. France-based dairy...
Recorded Future researchers uncovered a campaign conducted by Chinese APT41 group targeting critical infrastructure in India. Security researchers at Recorded...
JFC International, a major wholesaler and distributor of Asian food products in the United States, was hit by ransomware. JFC...
The Javascript-based infection framework for the Gootkit RAT was enhanced to deliver a wider variety of malware, including ransomware. Experts...
In January 2021, Oxfam Australia was the victim of a data breach which exposed 1.8M unique email addresses of supporters...
In August 2020, the Dutch ticketing service Ticketcounter inadvertently published a database backup to a publicly accessible location where it...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we...
Only days after the conclusion of its long-running fight with the Office of the Attorney General of New York, Tether...
According to the sources nearly half of the emails, phishing attacks in the year 2020 aimed to swipe credentials...
Among every state-sponsored hacking group that has attacked the U.S power grid, and went beyond to compromise American Electric Utilities,...
The US Senate’s select committee has blamed Russia for the massive intelligence operation that infiltrated SolarWinds, a Texas-based software company,...
Nation-states are employing cybercriminals for hacking activities to perpetrate assaults in order to conceal their own presence. An e-security report...
These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. The...
Halogen is a tool to automate the creation of yara rules against image files embedded within a malicious document.Halogen helppython3...
StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution...
This blog is part of an ongoing series sharing key takeaways from Rapid7’s 2020 Cloud Security Executive Summit. Interested in...