UltimaSMS subscription fraud campaign targeted millions of Android users
UltimaSMS, a massive fraud campaign is using Android apps with million of downloads to subscribe victims to premium subscription services....
UltimaSMS, a massive fraud campaign is using Android apps with million of downloads to subscribe victims to premium subscription services....
Kansas man Wyatt Travnichek admitted in court to tampering with the computer systems at the Post Rock Rural Water District....
The purpose of this script is to automate the web enumeration process and search for exploits and vulns. Added Tools...
An unknown ransomware gang leverages a critical SQL injection flaw in the BillQuick Web Suite time and billing solution to...
US CISA urges administrators to address a critical remote code execution flaw, tracked as CVE-2021-41163, in Discourse installs. Discourse is...
The Red Team Research (RTR), the bug’s research division from Italian Telecommunication firm TIM, found 2 new vulnerabilities affecting the...
Russia-linked Nobelium APTÂ group has breached at least 14 managed service providers (MSPs) and cloud service providers since May 2021. The...
VECTR documentation can be found here: DocumentationFeature Breakdowns By ReleaseVECTR v7.1.1 Feature BreakdownTeamLEAD PROGRAMMERS:Carl VonderheidGalen FisherDaniel HongPROGRAMMERS:Andrew ScottPatrick HislopDan GuzekZara...
Threat actors infected the iPhone of New York Times journalist Ben Hubbard with NSO Group’s Pegasus spyware between June 2018...
Experts from cybersecurity firm Emsisoft announced the availability of a free decryptor for past victims of the BlackMatter ransomware. Cybersecurity...
Microsoft uncovered an extensive series of credential phishing campaigns that employed a custom phishing kit tracked as TodayZoo. Microsoft researchers...
A PoC implementation for an advanced in-memory evasion technique that spoofs Thread Call Stack. This technique allows to bypass thread-based...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
This week, NATO Defence Ministers released the first-ever strategy for Artificial Intelligence (AI) that encourages the use of AI in...
OSINT Tool On Twitter And Instagram. Basic Usage:~/terra$ python3 terra.py <username of target> help : -j for saving results in a...
Threat actors are offering for sale a database containing 50 million records belonging to Moscow drivers on a hacking forum...
Cisco fixes an OS command-injection flaw, tracked as CVE-2021-1529, in Cisco SD-WAN that could allow privilege escalation and lead to...
This repository hosts the documentation and issue tracker for all SysFlow projects.Quick referenceDocumentation:the SysFlow DocumentationWhere to get help:the SysFlow Community...
The U.S. CISA warned of crypto-mining malware hidden in a popular JavaScript NPM library, named UAParser.js, which has millions of weekly downloads....
SubCrawl is a framework developed by  However, if this UI is not sufficient for the subsequent evaluation of the data,...
Facebook developed a new tool that allows security experts to look for Server-Side Request Forgery (SSRF) vulnerabilities in their software....
Groove ransomware operators call on other ransomware groups to stop competing and join the forces to fight against the US....
Darkside and BlackMatter ransomware operators have moved a large amount of their Bitcoin reserves after the recent shutdown of REvil’s...
PortBender is a TCP port redirection utility that allows a red team operator to redirect inbound traffic destined for one...