Researcher published PoC exploit for Ghostscript zero-day
A researcher published the PoC exploit code for a Ghostscript zero-day vulnerability that could allow completely compromise a server. Security...
A researcher published the PoC exploit code for a Ghostscript zero-day vulnerability that could allow completely compromise a server. Security...
An OSINT (Open Source Intelligence) software framework with an objective of making cyber investigations more convinient by implementing abstraction mechanisms...
Penelope is an advanced shell handler. Its main aim is to replace netcat as shell catcher during exploiting RCE vulnerabilities....
The development team behind the Jenkins server disclose a security breach, threat actors deployed a cryptocurrency miner on one of its...
The Ragnar Locker ransomware operators threaten to leak stolen data if the victims attempt to contact law enforcement agencies. The...
A police report revealed that the popular encrypted email service provider ProtonMail shared the IP address of a French activist with the...
A Russian man accused of being a member of the infamous TrickBot gang was arrested while trying to leave South...
PacketSifter is a tool to perform batch processing of PCAP data to uncover potential IOCs.Simply initializePacketSifter with your desired integrations...
OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services,...
Netgear has released security updates to address high-severity vulnerabilities affecting several of its smart switches used by businesses. Netgear has...
Security researcher ValdikSS found malware preinstalled in four low-budget push-button mobile phones available for sale on Russian e-stores. A Russian...
The FBI Internet Crime Complaint Center (IC3) warns of a spike in sextortion attacks since the beginning of 2021 that...
Pacific City Bank was hit by AVOS Locker Ransomware operators, the gang claims to have stolen sensitive file from the...
An advanced, yet simple, tunneling tool that uses a TUN interface.by TNP IT SecurityIntroductionLigolo-ng is a simple, lightweight and fast...
This project is a simple collection of various shell code injection techniques, aiming to streamline the process of endpoint detection...
The Irish Data Protection Commission has fined WhatsApp €225 million over data sharing transparency for European Union users’ data with Facebook. The...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
A massive DDoS hit New Zealand ‘s third-largest internet operator isolating parts of the country from the Internet. A massive...
The US Securities and Exchange Commission warns investors of potential investment scams that leverages Hurricane Ida as a bait. The US Securities and...
Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities... It's implemented...
A collaborative free open-source Command & Control integration framework that allows developers to concentrate on the core function and goal...
Apple will delay the introduction of its new child pornography protection tools due to a heated debate raised by privacy...
FIN7 cybercrime gang used weaponized Windows 11 Alpha-themed Word documents to drop malicious payloads, including a JavaScript backdoor. Anomali Threat...
The complete source code for the Babuk ransomware is available for sale on a Russian-speaking hacking forum. A threat actor...