Inadequate Payment Leads the Affiliate to Leak the Ransomware Gang’s Technical Manual
 A frustrated Conti affiliate revealed the gang's training material during attacks and released details on one of the administrators of...
 A frustrated Conti affiliate revealed the gang's training material during attacks and released details on one of the administrators of...
go-shellcode is a repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API...
___________.__ .______ ___ .__ __ __ _____ ___/| |_________ ____ _____ __| _/ | |__| |__|____ ____ | | ___/...
A Simple bash script to extract the NordLynx Wireguard config information that is needed to use wireguard and nord outside...
Taiwanese manufacturer and distributor of computer hardware GIGABYTE was a victim of the RansomEXX ransomware gang. RansomEXX ransomware gang hit...
RansomEXX ransomware operators hit the popular Italian luxury fashion house Ermenegildo Zegna Holding and started leaking stolen files. Zegna is one of...
Security firm Ivanti addressed a critical vulnerability in its Pulse Connect Secure VPN appliances that could be exploited to execute...
Summary: An issue was discovered in Sangoma Asterisk 13.x before 13.38.3, 16.x before 16.19.1, 17.x before 17.9.4, and 18.x before...
Summary: In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon...
Summary: In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon...
Summary: In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193....
Summary: PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535)...
Summary: replay-sorcery-kms in Replay Sorcery 0.6.0 allows a local attacker to gain root privileges via a symlink attack on /tmp/replay-sorcery...
The Internet has been on fire since the August 4 discovery (disclosed publicly by Mathew Green) that Apple will be...
In an attempt to make Edge more secure, the Microsoft Vulnerability Research team has started to experiment with disabling Just-In-Time...
 CaaS (Crime as a Service) is a practice where veteran hackers sell tools and knowledge required to perform a cybercrime....
 New security flaws have emerged in the AWS’ Amazon Simple Storage Service (S3) buckets which are now exposed via additional...
 Amazon has been fined 746 million ($880 million) Euros by the Luxembourg government over data protection rules. Despite its powerful...
 A recently patched vulnerability in the Chromium project enabled malicious parties to inject code in embedded site pages, despite the...
 StormWall, the provider of services for protecting networks from DDoS attacks, said that Russian companies have been attacked by one...
TwiTi, a tool for extracting IOCs from tweets, can collect a large number of fresh, accurate IOCs. TwiTi does classifying...
WARCannon was built to simplify and cheapify the process of 'grepping the internet'.With WARCannon, you can:Build and test regex patterns...
Security expert provided leak indicators for Conti ransomware operations that were recently disclosed by a disgruntled affiliate. An affiliate of...
VMware has addressed a critical vulnerability that affects multiple products that could be exploited to gain access to confidential information....