ONLINE DISINFORMATION: Under the hood of a Doppelgänger
ONLINE DISINFORMATION is one of the defining issues of our time and the influence of fake news has become an...
ONLINE DISINFORMATION is one of the defining issues of our time and the influence of fake news has become an...
The Russia-linked APT28 group is using mouse movement in decoy Microsoft PowerPoint documents to distribute malware. The Russia-linked APT28 employed a technique...
What is scan4all: integrated vscan, nuclei, ksubdomain, subfinder, etc., fully automated and intelligent。red team tools Code-level optimization, parameter optimization, and...
The recently born Bl00Dy Ransomware gang has started using the recently leaked LockBit ransomware builder in attacks in the wild....
nuvola is the new open-source cloud security tool to address the privilege escalation in cloud environments. nuvola is the new...
Meta dismantled a network of Facebook and Instagram accounts spreading disinformation across European countries. Meta announced to have taken down...
North Korea-linked Lazarus APT group is targeting macOS Users searching for jobs in the cryptocurrency industry. North Korea-linked Lazarus APT...
Elbit Systems of America, a subsidiary of defense giant Elbit Systems, disclosed a data breach after Black Basta ransomware gang...
WhatsApp has addressed two severe Remote Code Execution vulnerabilities affecting the mobile version of the software. WhatsApp has published three security...
Unoffical Flipper Zero cli wrapper written in PythonFunctions and characteristics: Flipper serial CLI wrapper Websocket client interfaceSetup instructions:$ git clone...
The recently discovered Erbium information-stealer is being distributed as fake cracks and cheats for popular video games. Threat actors behind...
Researchers are tracking multiple self-proclaimed hacktivist groups working in support of Russia, and identified 3 groups linked to the GRU....
The Ukrainian military intelligence warns that Russia is planning to escalate cyberattacks targeting Ukraine and Western allies. The Main Directorate...
China-linked cyberespionage group TA413 exploits employ a never-before-undetected backdoor called LOWZERO in attacks aimed at Tibetan entities. A China-linked cyberespionage group, tracked...
This project is a C# tool to use Pass-the-Hash for authentication on a local Named Pipe for user Impersonation. You...
A previously undetected hacking group, tracked as Metador, has been targeting telecommunications, internet services providers (ISPs), and universities for about...
Ransomware operators switch to new extortion tactics by using the Exmatter malware and adding new data corruption functionality. The data...
Threat actors target GitHub users to steal credentials and two-factor authentication (2FA) codes by impersonating the CircleCI DevOps platform. GitHub...
OpIran: Anonymous launched Operation Iran against Teheran due to the ongoing crackdown on dissent after Mahsa Amini’s death. Anonymous launched...
PSAsyncShell is an Asynchronous TCP Reverse Shell written in pure PowerShell.Unlike other reverse shells, all the communication and execution flow...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The Internet Systems Consortium (ISC) fixed six remotely exploitable vulnerabilities in the BIND DNS software. The Internet Systems Consortium (ISC)...
The cyber department of Ukraine ‘s Security Service (SSU) dismantled a gang that stole accounts of about 30 million individuals....
The City of London Police this week announced the arrest of a 17-year-old teenager on suspicion of hacking. Is he...