GSS, one of the major European call center providers, suffered a ransomware attack
The customer care and call center provider GSS has suffered a ransomware attack that crippled its systems and impacted its...
The customer care and call center provider GSS has suffered a ransomware attack that crippled its systems and impacted its...
In September 2021, the Thai-based English language teaching website Ajarn discovered they'd been the victim of a data breach dating...
Google researchers have identified malware developers generating malformed code signatures that appear to be valid in Windows to bypass security...
South African retail bank African Bank has confirmed that one of its debt recovery partners, Debt-IN, was targeted by a...
CISA officers on 23rd of September reported about a potential government-backed hacker organization that has tried to break the Port...
According to CyberNews, a database holding the records of about 3.8 billion Clubhouse and Facebook users is being auctioned at...
QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common. It could also been...
Project dedicated to provide DDoS protection with proof-of-workDescriptionPoW Shield provides DDoS protection on OSI application layer by acting as a...
Immediately after the public release of the exploit code for the VMware vCenter CVE-2021-22005 flaw threat actors started using it....
Google released a Chrome emergency update for Windows, Mac, and Linux that addresses a high-severity zero-day flaw exploited in the wild....
European Union representatives formally accused Russia of attempting to target the elections and political systems of several EU states. European...
SonicWall fixed a critical security flaw, tracked as CVE-2021-20034, that impacts some Secure Mobile Access (SMA) 100 series products that...
This morning Malwarebytes Labs received a scam masquerading as a security alert from Uber. The alert was pretty convincing and...
SonicWall has issued a security notice about its SMA 100 series of appliances. The vulnerability could potentially allow a remote...
Schools in the US have been using surveillance software to keep an eye on their students, and such software has...
A new study from security firm Tessian highlights the sophisticated techniques employed by threat actors to evade detection and trick...
A zero-day security flaw in the macOS Finder system in Apple might enable remote attackers to deceive users to perform...
Marcus & Millichap, a publicly-traded real estate investment corporation became the victim of a recent cyberattack that may have been...
About 60% of information leaks and 85% of hacks in corporate computer networks are related to unaccounted-for digital assets.According to...
Turns any junk text into a usable wordlist for brute-forcing.Installationgo install github.com/hakluke/haklistgen@latest Usage ExamplesScrape all words out of an HTTP...
Reconky is a script written in bash to automate the task of recon and information gathering.This Bash Script allows you...
Researcher release PoC exploit code for three iOS zero-day flaws after Apple delayed addressing them and did not credit him....
Cisco fixed three critical flaws impacting IOS XE operating system powering some of its devices, such as routers and wireless...
A user on a popular hacker forum is selling a database that purportedly contains 3.8 billion Clubhouse and Facebook user...