BaphoDashBoard – Dashboard For Manage And Generate The Baphomet Ransomware
With this proyect we will be able to handle the data of the victims we obtain with Baphomet Ransomware. BaphoDashBoard...
With this proyect we will be able to handle the data of the victims we obtain with Baphomet Ransomware. BaphoDashBoard...
Researchers at TIM’s Red Team Research discovered a zero-day vulnerability in IBM InfoSphere Information Server. Today, TIM’s Red Team Research...
Researchers from Microsoft are warning that the number of monthly web shell attacks has doubled since last year. Microsoft reported...
Security expert Dhiraj Mishra analyzed the popular instant messaging app Telegram and identified some failures in terms of handling the...
The fresh release of the Latin American Lampion trojan was updated with a new C2 address. Lampion trojan disseminated in...
An expert released a free decryption tool for the Avaddon ransomware, but operators quickly updated malware code to make it...
Lookout researchers provided details about two Android spyware families employed by an APT group tracked as Confucius. Researchers at mobile...
Summary: In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook...
Summary: Use after free in Blink in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to potentially exploit heap...
Summary: A Cross-Site Request Forgery (CSRF) issue in the NextGEN Gallery plugin before 3.5.0 for WordPress allows File Upload and...
Summary: In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to...
Summary: An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced. Reference Links(if...
Often the most brilliant ideas are the most simple. The hard part is being the first one to come up...
Researchers at cybersecurity firm Lookout have published information on two recently discovered Android spyware families utilized by an advanced persistent...
Over the past weeks, WhatsApp messenger has started losing millions of users. They migrate to Telegram. In mid-January, almost 25...
The Central Bank of the Russian Federation summed up the results of the cyber exercises held in November-December 2020, designed...
Iran, one of the resourceful countries in Western Asia in terms of weapons and cyber intelligence has resumed its cyberespionage...
American cable and Internet giant Comcast was struck by a data breach few days back. An unprotected developer database with...
Powerful Chromium Browser to find XSS Vulnerabilites automatically while browsing web, it can detect many case scenarios with support for...
PatrOwl provides scalable, free and open-source solutions for orchestrating Security Operations and providing Threat Intelligence feeds. PatrowlHears is an advanced...
Advantech iView versions prior to 5.7.03.6112 suffer from an instance of "CWE-306: Missing Authentication For Critical Function." This vulnerability (CVE-2021-22652)...
A total of eight criminals have been arrested on 9 February as a result of an international police operation into...
SAP released seven new security notes on February 2021 Security Patch Day, including a Hot News note for a critical issue affecting...
Antivirus firm Emsisoft discloses a data breach, a third-party had access to a publicly exposed database containing technical logs. The...