Crooks claims to have stolen 4TB of data from TransUnion South Africa
TransUnion South Africa discloses a data breach, threat actors who stolen sensitive data, demanded a ransom payment not to release...
TransUnion South Africa discloses a data breach, threat actors who stolen sensitive data, demanded a ransom payment not to release...
Google’s Threat Analysis Group (TAG) uncovered a new initial access broker, named Exotic Lily, that is closely affiliated with the Conti ransomware...
Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts. Ghostbuster obtains all the DNS...
Cybersecurity firm Emsisoft released a free decryptor that allows the victims of the Diavol ransomware to recover their files without...
Google’s TAG team revealed that China-linked APT groups are targeting Ukraine ’s government for intelligence purposes. Google’s Threat Analysis Group...
Today, cyber attacks are more numerous and cause damage in companies. Nevertheless, many software products exist to detect cyber threats....
Experts spotted a new Unix rootkit, called Caketap, that was used to steal ATM banking data. Mandiant researchers discovered a...
TIM Red Team Research (RTR) researchers discovered a new flaw on Ericsson Network Manager, aka Ericsson flagship network product. TIM...
The recently discovered Cyclops Blink botnet, which is believed to be a replacement for the VPNFilter botnet, is now targeting the ASUS...
Epagneul is a tool to visualize and investigate Deployment Requires docker and docker-compose to be installed. Installing make Offline deployment...
Microsoft released an open-source tool to secure MikroTik routers and check for indicators of compromise for Trickbot malware infections. Microsoft...
The developer behind the popular “node-ipc” NPM package uploaded a destructive version to protest Russia’s invasion of Ukraine. RIAEvangelist, the...
The program is made for educational purposes only for to see how the phishing method works. Any unnecessary use of...
The collective Anonymous and its affiliated groups continue to target the Russian government and private organizations. The collective Anonymous, and...
SolarWinds warns customers of potential cyberattacks targeting unpatched installs of its Web Help Desk (WHD) product. SolarWinds has published a...
The Security Service of Ukraine (SBU) announced the arrest of a “hacker” who helped Russian Army during the invasion. The...
Researchers uncovered a new Linux botnet, tracked as B1txor20, that exploits the Log4J vulnerability and DNS tunnel. Researchers from Qihoo...
This tool fetches resources from different cloud/saas applications focusing on permissions in order to identify privilege escalation paths and dangerous...
Russian disinformation continues, this time it used a deepfake video of Zelenskyy inviting Ukrainians to ‘lay down arms.’ A deepfake...
The US Cybersecurity and Infrastructure Security Agency (CISA) added 15 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S....
Introduction RefleXXion is a utility designed to aid in How to Use You can open and compile the project with...
FBI and CISA warn Russia-linked threats actors gained access to an NGO cloud after enrolling their own device in the...
WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral...
In mere seconds, a hacker remotely accessed a computer belonging to a regional Russian Ministry of Health, taking advantage of...