BEC Scams Cost American Companies Billions!
Business Email Compromise (BEC) scams have surfaced among several US companies and have caused them damage costing along the lines...
Business Email Compromise (BEC) scams have surfaced among several US companies and have caused them damage costing along the lines...
Millions of Android users are being cautioned against using a popular Android VPN that was removed by Google from its...
A lightweight native DLL mapping library that supports mapping directly from memoryFeaturesImports and delay imports are resolvedRelocations are performedImage sections...
Having a good technical understanding of the systems we land on during an engagement is a key condition for deciding...
Malicious actors created a fake webpage that impersonates cybersecurity company Malwarebytes and were using it as a gateway in a...
The coronavirus (COVID-19) has become a global pandemic, and this is a golden time for attackers to take advantage of...
Group-IB specialists identified the spread of a popular scam on the Network. The Double Deception scheme is as follows: people...
The latest report published by Meno Security indicates that 52% of the top one million websites have "HTTPS" in their...
Bitcoin, our favorite digital currency has experienced a certain kind of unbelievable hike, all of a sudden. It has profited...
Director of the Department of International Information Security of the Russian Foreign Ministry Andrei Krutskikh said on Tuesday during the...
A reconnaissance tool that analyzes ARP requests to identify hosts that are likely communicating with one another, which is useful...
Richkit is a python3 package that provides tools taking a domain name as input, and returns addtional information on that...
Organizations operating in a cloud environment like Amazon Web Services (AWS) face additional security risk challenges that they need to...
Crisis events such as the current COVID-19 pandemic often lead to a change in habits that captures the attention of...
In tough times like this, there is always someone out there looking for a weak spot to attack their enemy....
Figures of the year The share of spam in mail traffic was 56.51%, which is 4.03 p.p. more than in...
Chromepass is a python-based console application that generates a windows executable with the following features:Decrypt Chrome saved paswordsSend a file...
Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It...
Hey, gang. You know I'm a big open source fan and occasional contributor, so I just wanted to take a...
On this week’s episode of Security Nation, we had the pleasure of speaking with John Strand, CEO of BlackHills Information...
While exploit kit activity has been fairly quiet for some time now, we recently discovered a threat actor creating a...
The Internet of Things (IoT) is a term used to describe a wide variety of devices that are connected to...
First Deputy Chairman of the Bank of Russia Olga Skorobogatova said that blockchain is perfect for letters of credit and...
There is no denying the fact that whenever the word ransomware is mentioned computers are an instinctive afterthought to have...