Utah Gun Exchange – 235,233 breached accounts
In July 2020, the Utah Gun Exchange website suffered a data breach which included several other associated websites. In total,...
In July 2020, the Utah Gun Exchange website suffered a data breach which included several other associated websites. In total,...
In approximately March 2020, the Brazilian recruitment website Catho was compromised and subsequently appeared alongside 20 other breached websites listed...
In December 2019, the booking website Sonicbids suffered a data breach which they attributed to "a data privacy event involving...
Australian design platform Canva unwittingly provided phishing campaigns with graphics, making threat actors’ schemes appear more legitimate as they pilfer...
As if stress levels in the healthcare industry weren’t high enough due to the COVID-19 pandemic, risks to its already...
Experts of the company Group-IB, specializing in the prevention of cyberattacks, together with the Federal Tax Service (FTS), identified the...
Defending enterprise networks against attackers continues to present a difficult challenge for blue teams. Prevention has fallen short; improving detection...
Sinter is a 100% user-mode endpoint security agent for macOS 10.15 and above, written in Swift.Sinter uses the user-mode EndpointSecurity...
The Business Development Representative (BDR) program at Rapid7 is an entry-level program that develops our next generation of successful sales...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Posted by psy on Aug 17Hi Community, I am glad to present a new release of this tool: - https://ufonet.03c8.net...
Posted by Q C on Aug 14Advisory: two vulnerabilities found in MikroTik's RouterOS Details ======= Product: MikroTik's RouterOS Vendor URL:...
Posted by Pietro Oliva via Fulldisclosure on Aug 11Vulnerability title: Avian JVM vm::arrayCopy() silent return on negative length Author: Pietro...
Posted by Pietro Oliva via Fulldisclosure on Aug 11Vulnerability title: Avian JVM vm::arrayCopy() Multiple Integer Overflows Author: Pietro Oliva CVE:...
Posted by Egidio Romano on Aug 11SugarCRM < 10.1.0 (Reports Export) SQL Injection Vulnerability *• Software Link:*https://www.sugarcrm.com *• Affected Versions:*...
Arseniy Shcheltsin, CEO of Russian company Digital Platforms, said in an interview that modern TVs with Smart TV function are...
It's difficult to imagine life without Google and every day the search engine gets more involved and intricate in our...
A new pentesting virtual environment for IoT DevicesDownload Link : https://drive.google.com/open?id=1XwGqkLax2irSPpwEpeAqypl9vEywzw3DMD5 : d9c20057b14cfa3fb25f744813b828df ; SHA1: 8828d693dc6c809377bab40d2bc26f525685e287OS info and RequirementsBase OS...
Powerful web directory fuzzer to locate existing and/or hidden files or directories.Similar to dirb or gobuster, but with a lot...
Block the spread of malware and prevent lateral movement with Rapid7 Insight Agent Quarantine from InsightConnectRapid7’s Insight Agent is lightweight...
The Emotet authors are popular for capitalizing on trending events and holidays by disseminating customized templates in form of Christmas...
In the last month, FB CEO Mark Zuckerberg and others met with civil rights activists to discuss FB's way of...
Many usefull offensive CSharp Projects wraped into Powershell for easy usage.Why? In my personal opinion offensive Powershell is not dead...
Be sure to change the ftp variables throughout the code, these variables contain the username, password, & IP address of...