Purple Fox EK Relies on Cloudflare for Stability
We’ve talked about Purple Fox malware being delivered by the Rig exploit kit. Other researchers later found evidence that it...
We’ve talked about Purple Fox malware being delivered by the Rig exploit kit. Other researchers later found evidence that it...
Malicious actors continue to target environments running Docker containers. We recently encountered an attack that drops both a malicious cryptocurrency...
This week, learn about Trend Micro’s midyear roundup report which found that published vulnerabilities in the first half of 2020...
129 Vulnerabilities Patched in Microsoft's September 2020 Update Tuesday (2020-Sep Patch Tuesday)Despite maintaining the continued high volume of vulnerabilities disclosed...
Andrey Krutskikh, special representative of the President of Russia for international cooperation in the field of information security, said on...
Since the dawn of the digital age, Iranian hackers have been infamous for their attacks on critical infrastructures, targeting governments,...
Empire 3.4.0 is our next major release and is packed with one of the most advanced features to-date, Malleable C2....
Browsertunnel is a tool for exfiltrating data from the browser using the DNS protocol. It achieves this by abusing dns-prefetch,...
Resource monitor that shows usage and stats for processor, memory, disks, network and processes.Python port of bashtop.FeaturesEasy to use, with...
Posted by AdaptiveSecurity Consulting via Fulldisclosure on Sep 08CVSSv3.1 Score ------------------------------------------------- AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Vendor ------------------------------------------------- Hyland Software - (https://www.hyland.com/en/ and https://www.onbase.com/en/)...
Posted by AdaptiveSecurity Consulting via Fulldisclosure on Sep 08CVSSv3.1 Score ------------------------------------------------- AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Vendor ------------------------------------------------- Hyland Software - (https://www.hyland.com/en/ and https://www.onbase.com/en/)...
Last week on Malwarebytes Labs, we dug into security hubris on the Lock and Code podcast, explored ways in which...
Chinese hacker group Winnti attacked at least five Russian developers of banking software, as well as a construction company. According...
The Flying V took to air for the first time in July at a German Airbase with a successful flight...
A new set of cybersecurity principles were recently issued by the White House to ensure its commercial and critical infrastructure...
Crypto criminals have ramped up cryptocurrency theft, hacking, and fraud by a significant margin in the year 2020. They have...
According to the Georgian Ministry of Internal Affairs, the purpose of infiltrating the Ministry of Health's database was to get...
Pentest Cyber Range for a small Active Directory Domain. Automated templates for building your own Pentest/Red Team/Cyber Range in the...
A Fuzzer For OpenRedirect Issues.Key Features :Takes a url or list of urls and fuzzes them for Open redirect issuesYou...
Posted by AdaptiveSecurity Consulting via Fulldisclosure on Sep 07CVSSv3.1 Score ------------------------------------------------- AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Vendor ------------------------------------------------- Hyland Software - (https://www.hyland.com/en/ and https://www.onbase.com/en/)...
Posted by AdaptiveSecurity Consulting via Fulldisclosure on Sep 07CVSSv3.1 Score ------------------------------------------------- AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Vendor ------------------------------------------------- Hyland Software - (https://www.hyland.com/en/ and https://www.onbase.com/en/)...
Posted by AdaptiveSecurity Consulting via Fulldisclosure on Sep 07CVSSv3.1 Score ------------------------------------------------- AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L Vendor ------------------------------------------------- Hyland Software - (https://www.hyland.com/en/ and https://www.onbase.com/en/)...
Posted by AdaptiveSecurity Consulting via Fulldisclosure on Sep 07CVSSv3.1 Score ------------------------------------------------- AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Vendor ------------------------------------------------- Hyland Software - (https://www.hyland.com/en/ and https://www.onbase.com/en/)...
Posted by AdaptiveSecurity Consulting via Fulldisclosure on Sep 07CVSSv3.1 Score ------------------------------------------------- AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H Vendor ------------------------------------------------- Hyland Software - (https://www.hyland.com/en/ and https://www.onbase.com/en/)...