Clop Ransomware gang now contacts victims’ customers to force victims into pay a ransom
Clop ransomware operators now email victim’s customers and ask them to demand a ransom payment to protect their privacy to...
Clop ransomware operators now email victim’s customers and ask them to demand a ransom payment to protect their privacy to...
Researchers spotted a sophisticated Android spyware that implements exfiltration capabilities and surveillance features, including recording audio and phone calls. Experts...
Researchers at Avast have found an aggregate of 204 fleece ware applications with over a billion downloads and more than...
As the domain name suggests, Guns.com is a major Minnesota, US-based platform to buy and sell guns online. It is...
Weintek's human-machine interface (HMI) products include three types of critical vulnerabilities, according to a cybersecurity researcher - who specializes in...
An obscure monetarily spurred threat group is utilizing the self-proclaimed Hades ransomware variant in cybercrime activities that have affected at...
The Fastest Hash Cracking System pip3 install search-that-hash && sth Tired of going to every website to crack your hash?...
Automatically detect control-flow flattening and other state machines Author: Tim BlazytkoDescription:Scripts and binaries to automatically detect control-flow flattening and other state...
Apple has released new out-of-band updates for iOS, iPadOS, macOS and watchOS to address another zero‑day flaw, tracked CVE-2021-1879, actively...
Several members of the German Parliament (Bundestag) and other members of the state parliament were hit by a targeted attack...
Accenture security researchers published an analysis of the latest Hades campaign, which is ongoing since at least December 2020. Accenture’s Cyber Investigation &...
If you or anyone you know is committing the below social media sins, it’s time to change that habit of...
Two new vulnerabilities have been found in Intel processors. They are undocumented capabilities of the manufacturer that allow hijacking control...
AdaptiveMobile security researchers have discovered a major flaw in the architecture of 5G network slicing and virtualized network functions. This...
White hat hackers have disclosed a significant leak of client information by online forex dealer FBS Markets. This incorporates a...
The ransomware gang REvil introduced a special malware feature that allows attackers to reboot infected devices after encryption. REvil emerged...
A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE...
This is a collection of tools you may like if you are interested on reverse engineering and/or malware analysis on...
Solarwinds released security updates that address multiple vulnerabilities, including two flaws that be exploited by attackers for remote code execution....
The Federal Bureau of Investigation (FBI) issued an alert to warn that the Mamba ransomware is abusing the DiskCryptor open...
The OpenSSL Project addresses two high-severity vulnerabilities, including one related to verifying a certificate chain and one that can trigger...
The CyberNews investigation team found 62,174 potentially vulnerable unpatched Microsoft Exchange Servers. A number of entities in the US and...
Facebook has closed accounts used by a China-linked APT to distribute malware to spy on Uyghurs activists, journalists, and dissidents living...
Researchers at Guardicore have identified a new infection vector being used by the Perkiler malware where internet-facing Windows machines are...