Google sent over 50,000 warnings of state-sponsored attacks, +33% from same period in 2020
Google revealed to have sent roughly 50,000 alerts of state-sponsored phishing or hacking attempts to customers since January. Google announced...
Google revealed to have sent roughly 50,000 alerts of state-sponsored phishing or hacking attempts to customers since January. Google announced...
The Hillel Yaffe Medical Center in Hadera, Israel, was hit by a ransomware attack that was defined by Israel’s National...
Taiwanese electronics technology giant Acer discloses a security breach suffered by its after-sales service systems in India after an isolated...
Researchers spotted a new strain of ransomware, dubbed Yanluowang, that was used in highly targeted attacks against enterprises. Researchers from...
XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning. XMap is reimplemented and...
Apple has silently addressed a zero-day vulnerability that could allow attackers to gain access to sensitive user data. Apple has...
Unmanaged PowerShell execution using DLLs or a standalone executable. IntroductionPowerShx is a rewrite and expansion on the PowerShdll project. PowerShx...
The MyKings botnet (aka Smominru or DarkCloud) is still alive and continues to spread, allowing its operators to make huge...
Dutch police warn customers of a distributed denial-of-service (DDoS) website of stopping using the service to avoid prosecution. Dutch police...
rdesktop is an open source client for Microsoft's RDP protocol. It is known to work with Windows versions ranging from...
Threat actors are using mathematical symbols on impersonated company logos to evade detection in phishing campaigns. Researchers from anti-phishing cybersecurity...
A Chinese-speaking hacking group exploited a Windows zero-day vulnerability in a wave of attacks on defense and IT businesses. A...
The FreakOut (aka Necro, N3Cr0m0rPh) Python botnet evolves, it now includes a recently published PoC exploit for Visual Tools DVR....
Adobe addressed ten vulnerabilities across its Acrobat and Reader, Connect, Commerce, and Campaign Standard products. Adobe has released security updates...
Shisho is a lightweight Try at PlaygroundYou can try Shisho at our playground. Try with DockerYou can try shisho in...
Olympus US was forced to take down IT systems in the American region (U.S., Canada, and Latin America) following a...
Git GUI client GitKraken team fixed a flaw that lead to the generation of weak SSH keys, users are recommended...
Linux CatScale is a bash script that uses live of the land tools to collect extensive data from Linux based...
Microsoft Azure cloud service mitigated a massive DDoS attack of 2.4 terabytes per second (Tbps) at the end of August,...
Apple released emergency updates for both iOS and iPadOS to address a zero-day flaw that is actively exploited in the...
Ukrainian police arrested a cybercriminal who controlled a botnet composed of 100,000 devices that was available for rent to launch...
DEV-0343: Iran-linked threat actors are targeting US and Israeli defense technology companies leveraging password spraying attacks. Researchers at Microsoft Threat...
Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE...
LibreOffice and OpenOffice released security updates to address a vulnerability that can be exploited by an attacker to spoof signed...