Conti ransomware affiliate leaked gang’s training material and tools
An affiliate of the Conti RaaS has leaked the training material shared by the group with its network along with...
An affiliate of the Conti RaaS has leaked the training material shared by the group with its network along with...
The Uptycs Threat Research Team recently observed Golang-based worm dropping cryptominer binaries which use the MSR (Model Specific Register) driver.  By UPTYCS THREAT...
Summary: A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.X (All...
Summary: A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All...
Summary: isula-build before 0.9.5-6 can cause a program crash, when building container images, some functions for processing external data do...
Summary: A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series,...
Summary: The UAA reset password flow in Cloud Foundry release v236 and earlier versions, UAA release v3.3.0 and earlier versions,...
Retail giant Amazon recently offered to pay $10 USD for your palm prints. Would you offer them your hand? Many...
Tor, The Onion Router Tor (The Onion Router) is free software used to keep your online communications safe and secure...
 Reposify, the leading external attack surface management platform published its Pharmaceutical Industry Attack Surface Exposures Report analyzing the security status...
A Silicon Valley advanced technology venture capital organization was hit hard by a ransomware attack in July 2021. The firm...
 Researchers at CyberNews have identified a new form of automated social engineering tool that can harvest one-time passwords (OTPs) from...
 Throughout the past two years, a fine crypto-mining malware outbreak has developed into a gigantic botnet system and is now...
Quarterly highlights The corporate sector In Q2Â 2021, corporate accounts continued to be one of the most tempting targets for cybercriminals....
ChangeTower is intended to help you watch changes in webpages and get notified of any changes written in Go This...
An Intelligent common user-password profiler that's named after the same tool in Mr.Robot series S01E01In simple words, elpscrk will ask...
If you are like me and use Telegram for everything, personal or work then I bet you’d want to have...
ERG SPA, an Italian energy company, reports a minor impact on its operations after the recent ransomware attack conducted by LockBit 2.0...
Cisco fixed critical, high severity pre-auth security vulnerabilities impacting multiple Small Business VPN routers. Cisco addressed critical and high severity...
The American venture capital firm Advanced Technology Ventures (ATV) disclosed a ransomware attack, crooks also stole data of some private investors. Advanced...
US CISA and NSA released new guidance that provides recommendations on how to harden Kubernetes deployments and minimize the risk...
Summary: A vulnerability in the software cryptography module of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense...
Summary: When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally...
Summary: The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows...