Canada Post disclosed a ransomware attack on a third-party service provider
Canada Post disclosed a ransomware attack on a third-party service provider that exposed shipping information for their customers. Canada Post...
Canada Post disclosed a ransomware attack on a third-party service provider that exposed shipping information for their customers. Canada Post...
The FBI revealed that foreign hackers compromised the network of a local US municipal government by exploiting flaws in an...
The US Department of Homeland Security (DHS) has announced new cybersecurity requirements for critical pipeline owners and operators. The Colonial pipeline...
Low to medium Ubuntu Core honeypot coded in Python.FeaturesOptional Login Prompt Logs commands used and IP addresses Customize MOTD, Port,...
fsp scans an APK and checks the Firestore database for rules that are not secure, testing with or without authentication....
NASA identified more than 6,000 cyber-related incidents in the last four years, according to a report published by its Office...
Threat actors have compromised offices of multiple Japanese agencies via Fujitsu ‘s ProjectWEB information sharing tool. Threat actors have breached...
A security expert has discovered a vulnerability in Apple M1 chips, dubbed M1RACLES, that cannot be fixed. Software engineer Hector...
Researchers discovered about 50,000 IPs across multiple Kubernetes clusters that were compromised by the TeamTNT.threat actors. Researchers from Trend Micro reported...
Last week, French authorities have seized the dark web marketplace Le Monde Parallèle, it is another success of national police...
Multi-platform toolkit for an interactive C2C DNS shell, by using DNS-Black-Cat, you will be able to execute system commands in...
qvm-create-windows-qube is a tool for quickly and conveniently installing fresh new Windows qubes with Qubes Windows Tools (QWT) drivers automatically....
Google experts discovered a new variant of Rowhammer attack against RAM memory cards that bypasses all current defenses Google researchers...
The Belgian interior ministry was targeted by a “sophisticated” cyber attack, a spokesman told RTBF public television on Tuesday. The...
VMware addresses a critical remote code execution (RCE) flaw in the Virtual SAN Health Check plug-in that impacts all vCenter...
An Iran-linked threat actor tracked as Agrius employed data-wipers disguised as ransomware to destroy targeted IT infrastructure. Researchers from cyber-security...
A flaw in Pulse Connect Secure VPN could allow an authenticated remote attacker to execute arbitrary code with elevated privileges....
This script will scan your codethe script can find check_file_upload issues host_header_injection SQl injection insecure deserialization open_redirect SSRF XSS LFI...
Steal Apache Solr instance Queries with or without a username and password. DISCLAIMER: This project should be used for authorized...
Trend Micro fixed some flaws in Trend Micro Home Network Security devices that could be exploited to elevate privileges or...
Apple has addressed three zero-day vulnerabilities in macOS and tvOS actively exploited in the wild by threat actors. Apple has...
The audio equipment manufacturer Bose Corporation said it was the victim of a ransomware attack that took place earlier this...
US banks are giving the green light to the adoption of facial recognition technology, while authorities provide regulations and updates...
Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at...