China-linked GIMMICK implant now targets macOS
Gimmick is a newly discovered macOS implant developed by the China-linked APT Storm Cloud and used to target organizations across...
Gimmick is a newly discovered macOS implant developed by the China-linked APT Storm Cloud and used to target organizations across...
An easily modifiable shellcode template for Get Started Clone this project and you are ready to start git clone https://www.github.com/Cracked5pider/ShellcodeTemplate...
Microsoft confirmed that Lapsus$ extortion group has hacked one of its employees to access and steal the source code of...
FastFinder is a lightweight tool made for threat hunting, live forensics and triage on both Windows and Linux Platforms. It...
The popular Anonymous hacktivist collective announced to have hacked Nestlè and leaked 10 GB of sensitive data because the food...
Internet search engine Censys reported a new wave of DeadBolt ransomware attacks targeting QNAP NAS devices. Internet search engine Censys...
Three critical RCE flaws affect hundreds of HP LaserJet Pro, Pagewide Pro, OfficeJet, Enterprise, Large Format, and DeskJet printer models....
The Lapsus$ extortion group claims to have stolen sensitive data from the identity and access management giant Okta solutions. The gang...
The Lapsus$ extortion group claims to have hacked Microsoft ‘s internal Azure DevOps server and leaked the source code for...
A new email campaign aimed at French entities leverages the Chocolatey Windows package manager to deliver the Serpent backdoor. Proofpoint...
Ukraine CERT (CERT-UA) warns of spear-phishing attacks conducted by UAC-0035 group (aka InvisiMole) on state organizations of Ukraine. The Government...
Microsoft is investigating claims that the Lapsus$ hacking group breached its internal Azure DevOps source code repositories. Microsoft announced that...
VPN Overall Reconnaissance, Testing, Enumeration and This kind of behaviour makes Vortex really easy to use. General Workflow Vortex has...
Italy’s data privacy watchdog launched an investigation into the “potential risks” associated with the use of Russian antivirus software Kaspersky....
A Ukrainian security researcher has leaked more source code from the Conti ransomware operation to protest the gang’s position on...
Oh365UserFinder is used for identifying valid o365 accounts and domains without the risk of account lockouts. The tool parses responses...
The DirtyMoe botnet continues to evolve and now includes a module that implements wormable propagation capabilities. In June 2021, researchers from...
PSRansom is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process of a generic...
Anonymous hacked Omega Company, the in-house R&D unit of Transneft, the Russian oil pipeline giant, and leaked stolen data. Anonymous...
This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective....
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Test AWS S3 buckets for read/write/delete access This tool was developed to quickly test a list of s3 buckets for...
FBI, CISA, and the European Union Aviation Safety Agency (EASA) warn of possible threats to international satellite communication (SATCOM) networks....
A BurpSuite plugin intended to help with Credits Created with <3 by Download Nuclei-Burp-Plugin If you like the site, please...