Experts warn of ransomware attacks against government organizations of small states
Cyber Research Labs reported a rise in ransomware attacks in the second quarter of 2022, small states are more exposed...
Cyber Research Labs reported a rise in ransomware attacks in the second quarter of 2022, small states are more exposed...
Labtainers include more than 50 cyber lab exercises and tools to build your own. Import a single VM appliance or...
Interpol arrested three Nigerian men in Lagos, who are suspected of using the Agent Tesla RAT to reroute financial transactions...
Experts warn of a new ongoing WhatsApp OTP scam that could allow attackers to hijack users’ accounts through phone calls....
A zero-day flaw in Microsoft Office that could be exploited by attackers to achieve arbitrary code execution on Windows systems....
A tool to help automate common persistence mechanisms. Currently supports Print Monitor (SYSTEM), Time Provider (Network Service), Start folder shortcut...
Researchers discovered a new ransomware family called GoodWill that asks victims to donate the ransom for social causes. CloudSEK’s Threat Intelligence Research...
The operators of the EnemyBot botnet added exploits for recently disclosed flaws in VMware, F5 BIG-IP, and Android systems. Operators...
A tool for automatically converting Run the first pass of mitmproxy2swagger: $ mitmproxy2swagger -i <path_to_mitmptoxy_flow> -o <path_to_output_schema> -p <api_prefix> Please...
Pro-Russian hacker group KillNet is threatening again Italy, it announced a massive and unprecedented attack on May 30. Pro-Russian hacker...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
A man from New York was sentenced to four years in prison for trading stolen credit card data and assisting...
Tool for discovering the origin host behind a reverse proxy. Useful for bypassing WAFs and other reverse proxies. How does...
BinAbsInspector (Binary Abstract Inspector) is a static analyzer for automated reverse engineering and scanning vulnerabilities in binaries, which is a...
360 Qihoo reported DDoS attacks launched by APT-C-53 (aka Gamaredon) conducted through the open-source DDoS Trojan program LOIC. Researchers at 360 Qihoo observed...
The recently launched Industrial Spy data extortion marketplace has now started its ransomware operation. In April, Malware HunterTeam and Bleeping...
Russia-linked threat actors are behind a new website that published leaked emails from leading proponents of Britain’s exit from the...
Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers. TURN is a protocol mostly...
GitHub provided additional details into the theft of its integration OAuth tokens that occurred in April, with nearly 100,000 NPM users’ credentials....
Microsoft found several high-severity vulnerabilities in a mobile framework used in pre-installed Android System apps. The Microsoft 365 Defender Research...
Linux Evidence Acquisition Framework (LEAF) acquires artifacts and evidence from Linux EXT4 systems, accepting user input to customize the functionality...
Security researchers devised a technique, dubbed GhostTouch, to remotely control touchscreens using electromagnetic signals. A team of researchers from Zhejiang...
The FBI warns organizations in the higher education sector of credentials sold on cybercrime forums that can allow threat actors...
The goal of this repository is to provide a simple, harmless way to check your AV's protection on ransomware. This...