Anonymous and its affiliates continue to cause damage to Russia
The massive operation launched by the Anonymous collective against Russia for its illegitimate invasion continues. The popular collective Anonymous, and...
The massive operation launched by the Anonymous collective against Russia for its illegitimate invasion continues. The popular collective Anonymous, and...
CAPE is a malware sandbox. It was derived from Cuckoo with the goal of adding automated malware unpacking and config...
A Ukrainian researcher leaked the source for the Conti ransomware and components for the control panels. Recently a Ukrainian researcher leaked...
IsaacWiper, a new data wiper was used against an unnamed Ukrainian government network after Russia’s invasion of Ukraine. ESET researchers...
BruteShark is a Network Building a Network Diagram File Carving Password Extracting Reconstruct all TCP Sessions Extract VoIP Calls ...
Daxin is the most advanced backdoor in the arsenal of China-linked threat actors designed to avoid the detection of sophisticated...
Checkov is a Getting started Requirements Python >= 3.7 (Data classes are available for Python 3.7+) Terraform >= 0.12 Installation...
US CISA and the FBI warned US organizations that data wiping attacks targeting Ukraine entities could spill over to targets...
Microsoft revealed that Ukrainian entities were targeted with a previous undetected malware, dubbed FoxBlade, several hours before the invasion. The...
Anonymous and other hacker groups that responded to the call to war against Russia continue to launch cyberattacks on gov...
Japanese carmaker Toyota Motors was forced to stop car production due to a cyberattack against one of its suppliers. Japanese...
A Ukrainian researcher leaked tens of thousands of internal chat messages belonging to the Conti ransomware operation. A Ukrainian researcher leaked 60,694...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
An Iran-linked threat actor, tracked as UNC3313, was observed using two custom backdoor against an unnamed Middle East government entity....
The Anonymous hacker collective claims to have breached the Belarusian Railway’s data-processing network. The Anonymous collective announced that the internal...
DRAKVUF Sandbox is an automated black-box malware analysis system with DRAKVUF engine under the hood, which does not require an...
This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective....
Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian...
StayKit is an extension for Cobalt Strike persistence by leveraging the execute_assembly function with the SharpStay .NET assembly. The aggressor...
The chipmaker giant Nvidia was the victim of a ransomware attack that took down some of its systems for two...
Katoolin3 brings all programs available in Kali Linux to Debian and Ubuntu. Description This program is a port of katoolin...
Researchers provided details about a stealthy custom malware dubbed SockDetour that targeted U.S.-based defense contractors. Cybersecurity researchers from Palo Alto Networks’ Unit...
Global internet monitor working group NetBlocks reported that Twitter has been restricted in Russia amid conflict with Ukraine. Global internet...
Anonymous collective has hacked the Russian Defense Ministry and leaked the data of its employees in response to the Ukraine...