Judge-Jury-and-Executable – A File System Forensics Analysis Scanner And Threat Hunting Tool
Features:Scan a mounted filesystem for threats right away Or gather a system baseline before an incident, for extra threat hunting...
Features:Scan a mounted filesystem for threats right away Or gather a system baseline before an incident, for extra threat hunting...
The idea is to "translate" Windows OS privileges to a path leading to: administrator, integrity and/or confidentiality threat, availability threat,...
Chinese military unit PLA Unit 61419 is suspected to be involved in cyber-espionage campaigns against multiple antivirus companies. Researchers from...
A taste of the latest release of QakBot – one of the most popular and mediatic trojan bankers active since...
Cisco fixed critical flaws in SD-WAN vManage and HyperFlex HX software that could allow creating admin accounts, and executing commands...
Proofpoint offices in Toronto, Canada. (Raysonho @ Open Grid Scheduler / Scalable Grid Engine, CC0, via Wikimedia Commons)Researchers issued a...
A recent cyberattack has forced The Alaska Court System (ACS) to temporarily discontinue its online services to the public including...
FireEye, the intelligence-led security company, published the FireEye Mandiant M-Trends 2021 report. The FireEye-owned forensic specialist’s M-Trends 2021 report was...
The press service of the Russian Ministry of Internal Affairs reported that employees of the department have been using a...
According to many press reports and the San Diego Union-Tribune, the San Diego-based Scripps Health still tries to assemble certain...
In a surge of cyberattacks that began last week, a new ransomware group known as 'N3TW0RM' is targeting Israeli companies. N3TW0RM,...
Introduction to KubeArmorKubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file access,...
For complete documentation visit www.botkube.io BotKube integration with Slack, Mattermost or Microsoft Teams helps you monitor your Kubernetes cluster, debug...
A new cybercrime gang, tracked as UNC2529, has targeted many organizations in the US and other countries using new sophisticated...
Cyber Defense Magazine March 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 90 pages of...
Researchers found a critical vulnerability in HPE Edgeline Infrastructure Manager that could be exploited by a remote attacker to bypass...
A massive distributed denial of service (DDoS) attack shut down Belgiums’ government websites, internal networks were also impacted. A massive...
The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers...
Spectre is the name for a whole class of vulnerabilities discovered in January 2018 that affected huge numbers of modern...
Around 7:20 a.m. on Monday, May 3, 2021, the database was first made public on a prominent Russian hacker website....
UK cybersecurity organization TurgenSec has reported over 345,000 important credential files were leaked from the Filipino solicitor-general office including information...
Swiss Cloud, a Switzerland-based cloud hosting provider, suffered a ransomware attack that seriously impacted its server infrastructure. The incident took...
Cybersecurity agency Group-IB and UNICC carried out a joint venture where they took down 134 websites handled by hacking group...
Two researchers have shown how a Tesla and probably other cars can be remotely hacked without the involvement of the...