Joker Virus is Back, Targeting Android Devices
The notorious Joker has made a comeback, according to Belgian police, who cautioned about the Joker Virus that only targets...
The notorious Joker has made a comeback, according to Belgian police, who cautioned about the Joker Virus that only targets...
Researchers at Abnormal Security have identified a Nigerian threat actor attempting to recruit employees by offering them to pay $1...
Since 2017, five separate Chinese threat groups have used ShadowPad, an infamous Windows backdoor that allows attackers to download additional...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing...
PowerShell toolkit for auditing Active Directory Certificate Services (AD CS). It is built on top of PKISolution's PSPKI toolkit (Microsoft...
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
Threat actors claim to have a database containing private information on roughly 70 million AT&T customers, but the company denies...
Experts spotted a modified version of WhatsApp for Android, which offers extra features, but that installs the Triada Trojan on...
The South Korean multinational Samsung revealed that it can disable its Samsung TV sets remotely using the TV Block feature. Samsung...
The OpenSSL Project patched a high-severity vulnerability, tracked as CVE-2021-3711, that can allow an attacker to change an application’s behavior...
Citizen Lab uncovered a new zero-click iMessage exploit that was used to deploy the NSO Group’s Pegasus spyware on devices belonging...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
Summary: An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It does not...
Summary: An issue was discovered in HAProxy 2.2 before 2.2.16, 2.3 before 2.3.13, and 2.4 before 2.4.3. It can lead...
Summary: An information disclosure vulnerability exists in the EPA protocol of Dut Computer Control Engineering Co.'s PLC MAC1100. Reference Links(if...
Summary: An issue present in lowering/register allocation could have led to obscure but deterministic register confusion failures in JITted code...
Summary: A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash. This vulnerability...
In November 2016, the game developer Suba Games suffered a data breach which led to the exposure of 6.1M unique...
In October 2018, the restaurant reservation service Eatigo suffered a data breach that exposed 2.8 million accounts. The data included...
In life, when you encounter something momentuous—a sudden job loss, a routine check-up that revealed an illness you can’t afford...