Microsoft has taken legal and technical action to dismantle the Zloader botnet
Microsoft’s Digital Crimes Unit (DCU) announced to have shut down dozens C2 servers used by the infamous ZLoader botnet. Microsoft dismantled...
Microsoft’s Digital Crimes Unit (DCU) announced to have shut down dozens C2 servers used by the infamous ZLoader botnet. Microsoft dismantled...
presshell Quick & dirty Wordpress Command Execution Shell. Execute shell commands on your wordpress server. Uploaded shell will probably be...
Apache addressed a critical flaw in Apache Struts RCE that was linked to a previous issue that was not properly...
China-linked Hafnium APT group started using a new piece of new malware to gain persistence on compromised Windows systems. The...
Researchers discovered five vulnerabilities that can be exploited to remotely hack hospital Aethon’s TUG autonomous mobile robots. Researchers at healthcare...
Melody Monitor the Internet's background noiseMelody is a transparent internet sensor built for Quickstart Quickstart details. TL;DR Release Get the...
According to a report published by Reuters, an Israeli surveillance software was used to spy on senior officials in the...
Microsoft Partch Tuesday security updates for April 2022 fixed 128 vulnerabilities, including an actively exploited zero-day reported by NSA. Microsoft...
Maat is an open-source Dynamic Symbolic Execution and Binary Analysis framework. It provides various functionalities such as symbolic execution, taint...
The dark web marketplace RaidForums has been shut down and its infrastructure seized as a result of Operation TOURNIQUET. The...
Russia-linked Sandworm APT group targeted energy facilities in Ukraine with INDUSTROYER2 and CADDYWIPER wipers. Russia-linked Sandworm threat actors targeted energy...
By Cas van Cooten ( Usage usage: NimPackt.py -e EXECUTIONMODE -i INPUTFILE required arguments: -e EXECUTIONMODE, --executionmode EXECUTIONMODE Execution mode...
The maintainers of the NGINX web server project addressed a zero-day vulnerability in the Lightweight Directory Access Protocol (LDAP) Reference...
The U.S. CISA added the CVE-2022-23176 flaw in WatchGuard Firebox and XTM appliances to its Known Exploited Vulnerabilities Catalog. The U.S....
The Anonymous collective has hacked Russia’s Ministry of Culture and leaked 446 GB of data through the DDoSecrets platform. Data...
EvilSelenium is a new project that weaponizes Support Follow me on twitter @mrd0x BTC Wallet: 38ApE9ciNHiXzEaQExLXdwM6TrEpz2wCUi (for coffee obviously) Download...
Cybersecurity researchers spotted a new Windows information-stealing malware, named FFDroider, designed to steal credentials and cookies. Cybersecurity researchers from Zscaler...
SuperCare Health, a leading respiratory care provider in the Western U.S, disclosed a data breach that impacted more than 300,000...
wholeaked is a file-sharing tool that allows you to find the responsible person in case of a leakage. It's written...
Microsoft announced a feature called Autopatch that will allow organizations to keep their systems up-to-date starting with Windows Enterprise E3 (July 2022)....
Dependency Review GitHub Action scans users’ pull requests for dependency changes and will raise an error if any new dependencies...
Easy Appointments contained a very dangerous Broken Access Control vulnerability tracked as CVE-2022-0482 that was exposing PII. Another day, another...
This repository contains a small tool inherited from ldap_shell (https://github.com/SecureAuthCorp/impacket/blob/master/impacket/examples/ldap_shell.py). Installation These tools are only compatible with Python 3.5+. Clone...
This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective....