Babuk Ransomware Gang is Back Into Action
Although they are declaring their retirement from the firm, the Babuk ransomware operators seem to have reverted into old habits...
Although they are declaring their retirement from the firm, the Babuk ransomware operators seem to have reverted into old habits...
The unidentified hackers attacked the website of MonPass, one of Mongolia's leading certificate authorities, to backdoor its installation software with...
Scour is a modern module based AWS exploitation framework written in golang, designed for red team testing and blue team...
Featuressupport fuzzy search broken header dex. fix struct data of dex-header. compatible with all android version(frida supported). support loading as...
Threat actors compromised the servers of Mongolian certificate authority (CA) MonPass and used its website to spread malware. Hackers compromised...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Swedish supermarket chain Coop is the first company to disclose the impact of the recent supply chain ransomware attack that...
A supply attack by REvil ransomware operators against Kaseya VSA impacted multiple managed service providers (MSPs) and their clients. A...
Summary: Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary...
Summary: HDFS clients interact with a servlet on the DataNode to browse the HDFS namespace. The NameNode is provided as...
Summary: In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce request which bypasses...
Summary: Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes...
Summary: An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the...
In January 2021, the now defunct Iranian social media platform Raychat suffered a data breach that exposed 939 thousand unique...
Kaspersky said that the most professional, most aggressive espionage attacks are carried out by those who speak English, Russian and...
The second wave of deadly COVID-19 has left many countries’ economies in ruins, especially developing countries are undergoing a tough...
The Indian government seems to be gearing up in the wake of the growing threat of cyber-attacks against the Indian...
Currently, the US is the leading cyberspace power, but China is also closing in quickly and will be a tough...
Increasing safety measures led attackers to explore different ways to breach systems. The increasing number of firewall and ransomware attacks...
MacHound is an extension to the Bloodhound audting tool allowing collecting and ingesting of Active Directory relationships on MacOS hosts....
Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's People API....
Wizard Spider, the cybercrime gang behind the TrickBot botnet, is believed to be the author of a new ransomware family dubbed...
Microsoft is urging Azure users to update PowerShell to address a remote code execution vulnerability that was fixed earlier this...
Summary: Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue...