PS2EXE – Module To Compile Powershell Scripts To Executables
Overworking of the great script of Ingo Karstein with GUI support. The GUI output and input is activated with one...
Overworking of the great script of Ingo Karstein with GUI support. The GUI output and input is activated with one...
Europol, along with Italian and Spanish police, dismantled a major crime organization linked to the Italian Mafia that focuses on...
A Pakistani national has been sentenced to 12 years of prison in the US for his role in a hacking...
Numando, a new banking Trojan that abuses YouTube, Pastebin, and other public platforms as C2 infrastructure and to spread. ESET...
In September 2021, the domain registrar and web host Epik suffered a significant data breach, allegedly in retaliation for hosting...
The City of Yonkers has refused to pay the ransom after ransomware attackers demanded a ransom of $10 million to...
Suspected hackers momentarily impacted the website of the authority managing Germany's September 26 federal election, a spokesperson for the agency...
Hackers from other countries were able to impersonate 75 bank clients and made $500,000 in fraudulent credit card payments. This...
Security experts have found a new malware variant that uses Windows Subsystem for Linux to infect systems covertly. The research...
InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly...
QLOG provides enriched Event Logging for security related events on Windows based systems. It is under heavy development and currently...
The popular whistleblower Edward Snowden recommends customers of ExpressVPN VPN service to stop using it. Last week the Israeli cybersecurity...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
US Government is expected to issue sanctions against crypto exchanges, wallets, and traders used by ransomware operations to cash out...
Security researchers from the Cisco Talos team uncovered a spear-phishing campaign targeting the aviation industry for two years avoiding detection....
Information security specialists from Kaspersky Lab reported that hackers are trying to attack Russian companies through a new vulnerability in...
The Republican Governors Association was one of many U.S. organizations attacked in March when a nation-state group exploited vulnerabilities in...
Cybersecurity researchers at Cofense Phishing Defense Center (PDC) have unearthed a new phishing campaign that uses 'information technology (IT) support-themed...
South Africa's Justice Department was attacked earlier this month by a major ransomware attack and has been struggling since then...
Ransomware has traditionally concentrated on encryption, but one of the most common recent additions is the exfiltration and threatening disclosure...
BatchQL is a GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations. This script is...
Concealed Position is a local privilege escalation attack against Windows using the concept of "Bring Your Own Vulnerability". Specifically, Concealed...
A new critical vulnerability in Netgear smart switches can be exploited by an attacker to potentially execute malicious code and...
Chipmaker AMD has addressed a vulnerability in PSP driver, tracked as CVE-2021-26333, that could allow an attacker to obtain sensitive...