XLoader, a $49 spyware that could target both Windows and macOS devices
Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and...
Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and...
A US federal judge sentenced Russian hacker Peter Levashov to 33 months, time served, and three years of supervised release...
Experts discovered a Local Privilege Escalation, tracked as CVE-2021-33909, that could allow attackers to get root access on most Linux...
Experts warn of a 16-year-old vulnerability (CVE-2021-3438) in an HP, Xerox, and Samsung printers driver that an attacker could exploit...
Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like...
Download Regexploit If you like the site, please consider joining the telegram channel or supporting us on Patreon using the...
Fortinet fixes a serious bug in its FortiManager and FortiAnalyzer network management solutions that could be exploited to execute arbitrary...
Microsoft has seized 17 malicious homoglyph domains used by crooks in a business email compromise (BEC) campaign targeting its users. Microsoft’s Digital...
A recently discovered iPhone Wi-Fi bug that could crash the WiFi connectivity could be exploited by attackers to achieve remote...
US DoJ indicted four members of the China-linked cyberespionage group known as APT40 for hacking various entities between 2011 and...
Cisco Talos experts disclose details of several critical flaws in a router monitoring application developed by industrial and IoT firm...
Crawl SMB shares for juicy information. File content searching + regex is supported! File types supported:PDF DOCX XLSX PPTX any...
A simple multi-threaded distributed SSH brute-forcing tool written in Python.How it WorksWhen the script is executed without the --proxies switch,...
A hacker claims to have stolen 1 TB of sensitive data from the Saudi Arabian petroleum and natural gas giant,...
Pegasus Project investigation into the leak of 50,000 phone numbers of potential surveillance targets revealed the abuse of NSO Group’s...
Security researchers demonstrated how to bypass the Windows Hello facial recognition that is used in Windows 10 as a login...
ARTIF is a new advanced real time threat intelligence framework built that adds another abstraction layer on the top of...
DNSStager is an open-source project based on Python used to hide and transfer your payload using DNS. DNSStager will create...
Cyberspace Administration of China (CAC) issued new vulnerability disclosure regulations that oblige experts to report zero-days to the government. The...
Instagram introduced a new security feature dubbed “Security Checkup” to help users to recover their accounts that have been compromised....
BleepingComputer became aware that the recent wave of attacks targeting vulnerable SonicWall devices was carried out by HelloKitty ransomware operators....
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Cilium is open source software for providing and transparently securing network connectivity and loadbalancing between application workloads such as application...
Bughound is an open-source static code analysis tool that analyzes your code and sends the results to Elasticsearch and Kibana...