Security Affairs newsletter Round 318
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is build with modules for each provider and each...
iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the...
McDonald’s fast-food chain disclosed a data breach, hackers have stolen information belonging to customers and employees from the US, South...
Volkswagen America discloses a data breach at a third-party vendor that exposed the personal details of more than 3.3 million...
An authentication bypass flaw in the polkit auth system service used on most Linux distros can allow to get a...
The Avaddon ransomware gang has shut down its operations and released the decryption keys to allow victims to recover their...
The current era, where all data is digital, the threats of fraud, breach and data sprawl are more of a...
Italy announced the creation of the national cybersecurity agency, a move aimed at increase the level of cyber security of...
Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external...
Cyber Range deployment of HELK and Velociraptor! Automated terraform deployment of one system running HELK + Velociraptor server with one...
Experts spotted a new mysterious malware that was used to collect a huge amount of data, including sensitive files, credentials,...
Qatari government-funded international Arabic news channel Al Jazeera announced to have blocked a series of disruptive cyberattacks aimed at its...
The US Department of Justice seized the servers and domains of the popular cybercrime marketplace SlilPP. The US Department of Justice...
Threat hunting and adversarial cyber intelligence company Group-IB published a comprehensive analysis of fraud cases on a global scale. Group-IB, a...
Hackers breached the network of the gaming giant Electronic Arts (EA) and have stolen roughly 780 GB of data, including game...
A framework that aids in creation of self-spreading software Requirementsgo get -u github.com/redcode-labs/Coldfire go get -u github.com/yelinaung/go-haikunator New in v....
SQL / SQLI tokenizer parser analyzer. For C and C++ PHP Python Lua Java (external port) (https://github.com/p0pr0ck5/lua-ffi-libinjection) (external port) See...
The beef producer JBS has admitted to have paid an $11 million ransom to the REvil ransomware gang after the...
Google this week addressed 14 vulnerabilities in the Chrome browser, including a zero-day flaw that has been exploited in the...
Russia-linked cyberspies breached the internal network of Dutch police in 2017 while the authorities were investigating the crash of the...
Microsoft uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow pods that are used to mine cryptocurrency. Microsoft researchers...
The Spanish Ministry of Labor and Social Economy (MITES) was hit by a cyberattack and is working to restore impacted...
Google’s June security bulletin addresses more than 90 vulnerabilities in Android and Pixel devices, including a Critical RCE (CVE-2021-0507). Google’s...