An international joint operation resulted in the arrest of Clop ransomware members
Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an...
Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an...
aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely. The current version...
Gundog provides you with guided hunting in Microsoft 365 Defender. Especially (if not only) for Email and Endpoint Alerts at...
A flaw in the Peloton Bike+ could be exploited by an attacker with initial physical access to gain root entry...
A new variant of the Mirai botnet, tracked as Moobot, was spotted scanning the Internet for vulnerable Tenda routers. Researchers...
Japanese multinational conglomerate Fujifilm announced that it has restored operations following the recent ransomware attack. On June 4, the Japanese...
The source code for the Paradise Ransomware has been released on a hacking forum allowing threat actors to develop their...
New technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services...
Automated Attack Path Planning and Validation (A2P2V) is a planning and cyber-attack tool that provides the capability for users to...
Reality Winner, a former NSA contractor who leaked classified documents to the press in 2017, has been released from prison...
Instagram has addressed a new flaw that allowed anyone to access private accounts viewing archived posts and stories without having...
The MASQ tool could be used by attackers to emulate device fingerprints thus allowing them to bypass fraud protection controls The...
The REvil ransomware gang made the headlines again, the group hit the US nuclear weapons contractor Sol Oriens and stole...
Apple released an out-of-band iOS update for older iPhones and iPads and warned that threat actors are actively exploiting two...
Microsoft disrupted a large-scale business email compromise (BEC) campaign that used forwarding rules to access messages related to financial transactions....
Defenseless is a vulnerable web application written in PHP/MySQL. This is the first version of this application. The purpose of...
Project DescriptionThe redpill project aims to assist reverse tcp shells in post-exploration tasks. Often in redteam engagements we need to...
The member states of the G7 group have called on Russia and other states to dismantle operations of the ransomware...
A fire and cyberattack hit an electrical substation for the electricity provider Luma Energy, causing major blackouts across Puerto Rico....
ESET researchers discovered an advanced persistent threat (APT) group, tracked as BackdoorDiplomacy, that is targeting diplomats across Africa and the...
_______ _______ _ ______ _______ ( ____ ( ____ ( ( /|( __ ( ____ )| ( /| ( /|...
The easiest way to identify anythingpip3 install pywhat && pywhat --helpWhat is this? Imagine this: You come across some mysterious...
The Anti-Phishing Working Group (APWG) revealed that the number of phishing websites peaked at record levels in the first quarter...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...