BlackMatter and Haron, two new ransomware gangs in the threat landscape
The cyber threat landscape change continuously, recently two new ransomware-as-service (RaaS) operations named BlackMatter and Haron made the headlines. Recently,...
The cyber threat landscape change continuously, recently two new ransomware-as-service (RaaS) operations named BlackMatter and Haron made the headlines. Recently,...
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. Sniffle has a number of useful...
r2 is a rewrite from scratch of radare. It provies a set of libraries, tools and plugins to ease...
A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers...
Experts disclose details about a critical flaw in Microsoft Hyper-V, tracked as CVE-2021-28476, that can allow executing arbitrary code on...
A joint report published by US, UK, and Australian cyber security agencies warns of the top routinely exploited vulnerabilities in...
A China-linked cyberespionage group, tracked as PKPLUG, employed a previously undocumented strain of a RAT dubbed THOR in recent attacks....
CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user...
LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works...
The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded...
BlackMatter ransomware gang, a new threat actor appears in the threat landscape and claims to combine TTPs of Darkside and...
Researchers discovered flaws in Zimbra email collaboration software that could allow attackers to compromise email accounts by sending a malicious...
Azure JSON Web Token ("JWT") Manipulation Toolset Azure access tokens allow you to authenticate to certain endpoints as a user...
Reconmap is a vulnerability assessment and penetration testing (VAPT) platform. It helps software engineers and infosec pros collaborate on security...
Transnet SOC Ltd, a large South African rail, port and pipeline company, announced it was hit by a disruptive cyber attack. South Africa’s logistics company...
Experts found three new zero-day flaws in the Kaseya Unitrends service and warn users to avoid exposing the service to...
The Babuk ransomware operators seem to have suffered a ransomware attack, threat actors flooded their forum gay orgy porn images....
Apple released a security update that addresses CVE-2021-30807 flaw in macOS and iOS that may have been actively exploited to...
The No More Ransom initiative celebrates its fifth anniversary, over 6 million victims of ransomware attacks recover their files for...
Created by David French (@threatpunter) at Elastic Security Dorothy is a tool to help security teams test their monitoring and...
Juumla is a python tool developed to identify the current Joomla version and scan for readable Joomla config files.Installing /...
Researchers demonstrated how to hide malware inside an image classifier within a neural network in order to bypass the defense...
Microsoft published mitigations for the recently discovered PetitPotam attack that allows attackers to force remote Windows machines to share their...
A threat actor is offering for sale on hacking forums the secret database Clubhouse containing 3.8B phone numbers. Clubhouse is...