TikTok denies data breach following leak of user data
Threat actors published a sample of data allegedly stolen from TikTok, but the company denies it was breached. The hacking...
Threat actors published a sample of data allegedly stolen from TikTok, but the company denies it was breached. The hacking...
Microsoft released a Windows Defender update to fix a problem that caused Defender antivirus to identify Chromium, Electron, as malware...
Resecurity researchers discovered a new Phishing-as-a-Service (PhaaS) called EvilProxy advertised on the Dark Web. Original post: https://resecurity.com/blog/article/evilproxy-phishing-as-a-service-with-mfa-bypass-emerged-in-dark-web Following the recent Twilio hack...
Experts spotted an upgraded version of the SharkBot malware that was uploaded to the official Google Play Store. Fox IT...
Cybersecurity firm Armorblox discovered a new phishing campaign aimed at American Express customers. Armorblox researchers uncovered a new phishing campaign that is targeting American...
The popular collective Anonymous and the IT Army of Ukraine hacked the Yandex Taxi app causing a massive traffic jam...
BeatRev Version 2Disclaimer/LiabilityThe work that follows is a POC to enable malware to "key" itself to a particular victim in...
The Internal Revenue Service (IRS) mistakenly leaked confidential information for approximately 120,000 taxpayers. Bad news for approximately 120,000 taxpayers who...
The author of the remote access trojan (RAT) CodeRAT has leaked the source code of its malware on GitHub. The...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Google rolled out emergency fixes to address a vulnerability in the Chrome web browser that is being actively exploited in...
A python script to scan for Apache Tomcat server vulnerabilities. FeaturesMultithreaded workers to search for Apache tomcat servers.Multiple target source...
Electronics giant Samsung has confirmed a new data breach after some of its US systems were compromised in July. After...
The information-stealing malware Prynt Stealer contains a backdoor that allows stealing the data it has infiltrated from victims. Zscaler researchers...
Uptycs researchers recently spotted a new Linux ransomware that appears to be under active development. The Uptycs Threat Research team...
Researchers attribute the Raspberry Robin malware to the Russian cybercrime group known as Evil Corp group. IBM Security X-Force researchers...
Aced is a tool to parse and resolve a single targeted Active Directory principal's DACL. Aced will identify interesting inbound...
A security issue in the Google Chrome browser could allow malicious web pages to automatically overwrite clipboard content. A vulnerability...
Researchers discovered that the infrastructure used in Cisco hack was the same used to target a Workforce Management Solution firm....
Researchers from Cyble analyzed a new, highly evasive JavaScript skimmer used by Magecart threat actors. Cyble Research & Intelligence Labs...
The Ragnar Locker ransomware gang claims to have hacked the Portuguese state-owned flag carrier airline TAP Air Portugal and stolen...
Researchers discovered 1,859 Android and iOS apps containing hard-coded Amazon Web Services (AWS) credentials. Researchers from Broadcom Symantec’s Threat Hunter...
A tool built to automatically deauth local networks Tested on Raspberry Pi OS and Kali Linux Setup $ chmod +x...
A team of cybersecurity experts from the US FBI will help the authorities in Montenegro to investigate the recent massive...