CISA orders federal agencies to fix actively exploited CVE-2022-21882 Windows flaw
US CISA ordered federal agencies to patch their systems against actively exploited CVE-2022-21882 Windows flaw. The Cybersecurity and Infrastructure Security...
US CISA ordered federal agencies to patch their systems against actively exploited CVE-2022-21882 Windows flaw. The Cybersecurity and Infrastructure Security...
Business services firm Morley was hit by a ransomware attack that may have exposed data of +500,000 individuals. Business services...
A C# MS-SQL toolkit designed for offensive reconnaissance and post-exploitation. For detailed usage information on each technique, refer to the...
Aviation services company Swissport International was hit by a ransomware attack that impacted its operations. Swissport International Ltd. is an...
American media and publishing giant News Corp revealed it was victim of a cyber attack from an advanced persistent threat...
Retail giant Target is going to open-source an internal tool, dubbed Merry Maker, designed to detect e-skimming attacks. Retail giant Target...
The Russia-linked Gamaredon APT group attempted to compromise an unnamed Western government entity in Ukraine. Palo Alto Networks’ Unit 42...
elfloader is a super simple loader for ELF files that generates a flat in-memory representation of the ELF. Pair this...
An alleged Chinese threat actor is actively attempting to exploit a zero-day vulnerability in the Zimbra open-source email platform. An...
Office 365 and Azure Active Directory (Azure AD) customers were the targets of billions of brute-force and phishing attacks last...
Six years ago the Powerful Greek Army (PGA) appeared in the threat landscape. After a long breach the hacker collective...
Cisco released security patches to address multiple flaws in its Small Business RV160, RV260, RV340, and RV345 series routers. Cisco...
Modify version of impacket wmiexec.py,wmipersist.py. Got output(data,response) from registry, don't need SMB connection, but I'm in the bad code :(...
A China-linked APT group tracked as Antlion used a custom backdoor called xPack that was undetected for months. A China-linked...
A cyber attack hit the oil terminals of some of the biggest European ports impacting their operations. Some of the...
heaptrace is a heap debugger for tracking glibc heap operations in ELF64 (x86_64) binaries. Its purpose is to help visualize...
Threat actors have stolen $325 million in cryptocurrency leveraging a bug in the Wormhole communication bridge. Wormhole, one of the most...
Trend Micro recently addressed two high-severity flaws affecting some of its hybrid cloud security products. Trend Micro released security updates...
Security researcher discovered an Information Disclosure vulnerability in Brave browser and reported it through the HackerOne platform. Security researcher Kirtikumar...
Cyber security team at retail giant Walmart dissected a new ransomware family dubbed Sugar, which implements a ransomware-as-a-service model. The...
Antivirus firm ESET addressed a local privilege escalation vulnerability, tracked CVE-2021-37852, impacting its Windows clients. Antivirus firm ESET released security...
The Cybereason Nocturnus Team reported a spike in the activity of the Iran-linked APT group APT35 (aka Phosphorus or Charming Kitten). The Cybereason...
Svchost is essential in the implementation of so-called shared service processes, where a number of services can share a process...
Researchers discovered tens of vulnerabilities in UEFI firmware code used by the major device manufacturers. Researchers at firmware security company...