Conti ransomware demanded $20M ransom to Ireland Health Service Executive
Ireland Health Service Executive (HSE) refuses to pay a $20 million ransom demand after its systems were hit by the Conti...
Ireland Health Service Executive (HSE) refuses to pay a $20 million ransom demand after its systems were hit by the Conti...
Avaddon ransomware gang has breached the France-based financial consultancy firm Acer Finance. Avaddon ransomware gang made the headlines again, the...
PowerShell module for Office 365 and Azure AD log collectionModule description The DFIR-O365RC PowerShell module is a set of functions...
Red Kube is a collection of kubectl commands written to evaluate the security posture of Kubernetes clusters from the attacker's...
The chipmaker AMD published guidance for two new attacks against its SEV (Secure Encrypted Virtualization) protection technology. Chipmaker AMD has...
Hackers abuses Microsoft Build Engine (MSBuild) to filelessly deliver malware on targeted Windows systems, including RAT and password-stealer. Researchers from...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Alleged Pakistan-Linked cyber espionage group, tracked as Transparent Tribe, targets Indian entities with a new Windows malware. Researchers from Cisco...
C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or...
httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to...
A joint operation of European law enforcement agencies and coordinated by Europol dismantled a criminal ring involved in investment fraud....
XSS forum (previously known as DaMaGeLab) one of the most popular hacking forums, announced that it would ban the ads...
QNAP warns of an actively exploited Roon Server zero-day flaw and eCh0raix ransomware attacks on its NAS devices. QNAP warns...
FingerprintJS experts devised a fingerprinting technique, named scheme flooding, that could allow identifying users across different desktop browsers, including the...
The operators of the Darkside ransomware announced that they have lost control of their infrastructure and part of the funds...
An incredibly fast proxy checker & IP rotator with ease.FeaturesProxy IP rotator: Rotates your IP address for every specific request....
Ring 3 rootkitr77 is a ring 3 Rootkit that hides following entities from all processes: Files, directories, junctions, named pipes,...
Magecart cybercrime gang is using favicon to hide malicious PHP web shells used to maintain remote access to inject JavaScript...
Ireland’s Health Service Executive service shut down its IT systems after they were hit with a “significant ransomware attack.” Another major...
DarkSide demanded a $5 million ransom to Colonial Pipeline, which has quickly recovered operations, did it pay? The Colonial Pipeline...
Rapid7 disclosed that unauthorized third-party had access to source code and customer data as result of Codecov supply chain attack....
The recent Colonial Pipeline attack highlights the dangers that are facing Critical Infrastructure worldwide. The attack perpetrated by hackers on...
Hi GuysI need your support. I became aware only not that we can nominate SecurityAffairs as Best Personal Blog. I...
Full Automation Recon tool which works with Small and Medium scopes. ّIt's recommended to use it on VPS, it'll discover...