Threat actors stole $120 M in crypto from BadgerDAO DeFi platform
Threat actors stole $120 million in cryptocurrencies from multiple wallets connected to the decentralized finance platform BadgerDAO. Threat actors this...
Threat actors stole $120 million in cryptocurrencies from multiple wallets connected to the decentralized finance platform BadgerDAO. Threat actors this...
ClusterFuzzLite is a continuous fuzzing solution that runs as part of Continuous Integration (CI) workflows to find vulnerabilities faster than...
Threat actors have started to exploit the interest in the Omicron COVID-19 variant and are using it as a lure...
U.S. CISA urges to address vulnerabilities Qualcomm, Mikrotik, Zoho and the Apache Software Foundation software. U.S. Cybersecurity and Infrastructure Security...
Yet another An example run with auto calibration and recursive mode enabled Example reports Example reports can be found here...
Russia’s internet watchdog, ‘Roskomnadzor’, has announced the ban of other VPN products, 15 VPN services are now illegal in Russia...
Threat actors are targeting e-stores with remote access malware, dubbed NginRAT, that hides on Nginx servers bypassing security solutions. Researchers...
Kerberos attack toolkit -pure python-Â Install pip3 install kerberoast Prereqirements Python 3.6 See requirements.txt For the impatient IMPORTANT: the accepted...
Europol identified 18,351 money mules and arrested 1,803 of them as part of an international anti-money-laundering operation codenamed EMMA 7....
Mozilla fixed a critical memory corruption issue affecting its cross-platform Network Security Services (NSS) set of cryptography libraries. Mozilla has...
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan. With ShonyDanza, you can: Obtain...
VirusTotal announced VirusTotal Collections, a new service that allows security researchers to share sets of Indicators of Compromise (IoCs). VirusTotal...
Nation-state actors from China, India, and Russia, were spotted using a novel RTF template injection technique in recent attacks. APT...
Netcat like reverse shell for Linux & Windows. Features WindowsUsage:â”” Shared Commands: !exit !upload <src> <dst> * uploads a file...
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The...
Sabbath ransomware is a new threat that has been targeting critical infrastructure in the United States and Canada since June...
Opera released a mini patch for a vulnerability in their turbo servers that dates back to 2018. Prior approval are...
ZipExec is a Proof-of-Concept (POC) tool to wrap binary-based tools into a password-protected zip file. This zip file is then...
360 Netlab experts spotted a new botnet dubbed EwDoor that infects unpatched AT&T enterprise network edge devices. Experts from Qihoo 360’s...
Researchers discovered a critical wormable buffer overflow vulnerability that affects 150 different HP multifunction printer models (MFPs). Cybersecurity researchers from...
A threat actor named WIRTE targets government, diplomatic entities, military organizations, law firms, and financial institutions in Middle East. Cybersecurity...
Kit Hunter: A basic phishing kit detection tool Version 2.6.0 28 September 2021 Testing and development took place on Python...
Experts found four Android banking trojans that were available on the official Google Play Store and that infected +300,000 devices....
Google Project Zero researchers have discovered two vulnerabilities in the video conferencing software Zoom that expose users to attacks. Security...