Experts spotted five malicious Google Chrome extensions used by 1.4M users
Researchers spotted 5 malicious Google Chrome extensions used to track users’ browsing activity and profit of retail affiliate programs. McAfee...
Researchers spotted 5 malicious Google Chrome extensions used to track users’ browsing activity and profit of retail affiliate programs. McAfee...
Experts uncovered a cyber espionage campaign conducted by a China-linked APT group and aimed at several entities in the South...
A curated list of awesome tools, research, papers and other projects related to password cracking and password security. Read the...
The Russian subscription-based streaming service Start discloses a data breach affecting 7.5 million users. The Russian media streaming platform START...
Google this week launched a new bug bounty program that covers the open source projects of the IT giant. Google...
Researchers spotted three campaigns delivering multiple malware, including ModernLoader, RedLine Stealer, and cryptocurrency miners Cisco Talos researchers observed three separate,...
GhostCat Firstly we use "nmap" to do a port scan. nmap port scan Exploit After a while, I stumbled across...
A group of researchers from the Georgia Institute of Technology discovered malicious plugins on tens of thousands of WordPress sites....
Masky is a Masky also provides options that are commonly provided by such tools (thread number, authentication mode, targets loaded...
Baker & Taylor, one of the world’s largest distributors of books, revealed that it was hit by a ransomware attack....
The U.S. FBI warns investors that crooks are increasingly exploiting security issues in Decentralized Finance (DeFi) platforms to steal cryptocurrency....
The U.S. FTC sued US data broker Kochava for selling sensitive and precise geolocation data collected from hundreds of millions...
Threat actors behind the Twilio hack also gained access to the accounts of 93 individual users of its Authy two-factor...
Researchers spotted a Turkish-based crypto miner malware campaign, tracked as Nitrokod, which infected systems across 11 countries. Check Point researchers...
Erlik - Informaion Disclosure Code: Code: Command Injection Code: Brute Force Code: Deserialization Code: Download Vulnerable-Soap-Service If you like the...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 10 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity...
Scammers used a deepfake AI hologram of the Binance chief communications officer for fraudulent activities. Patrick Hillmann, chief communications officer...
Researchers discovered leaked PII stolen from Thailand’s Department of Medical Sciences containing information about citizens with COVID-19. Resecurity, a California-based...
Leaked documents show the surveillance firm Intellexa offering exploits for iOS and Android devices for $8 Million. Intellexa is an...
The Python Package Index (PyPI) warns of an ongoing phishing campaign to steal developer credentials and distribute malicious updates. The...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of...
Trend Micro researchers warn of a new ransomware family called Agenda, which has been used in attacks on organizations in...
Twilio hackers also compromised the food delivery firm DoorDash, the attackers had access to company data, including customer and employee...