QLOG – Windows Security Logging
QLOG provides enriched Event Logging for security related events on Windows based systems. It is under heavy development and currently...
QLOG provides enriched Event Logging for security related events on Windows based systems. It is under heavy development and currently...
The popular whistleblower Edward Snowden recommends customers of ExpressVPN VPN service to stop using it. Last week the Israeli cybersecurity...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
US Government is expected to issue sanctions against crypto exchanges, wallets, and traders used by ransomware operations to cash out...
Security researchers from the Cisco Talos team uncovered a spear-phishing campaign targeting the aviation industry for two years avoiding detection....
Information security specialists from Kaspersky Lab reported that hackers are trying to attack Russian companies through a new vulnerability in...
 The Republican Governors Association was one of many U.S. organizations attacked in March when a nation-state group exploited vulnerabilities in...
 Cybersecurity researchers at Cofense Phishing Defense Center (PDC) have unearthed a new phishing campaign that uses 'information technology (IT) support-themed...
 South Africa's Justice Department was attacked earlier this month by a major ransomware attack and has been struggling since then...
 Ransomware has traditionally concentrated on encryption, but one of the most common recent additions is the exfiltration and threatening disclosure...
BatchQL is a GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations. This script is...
Concealed Position is a local privilege escalation attack against Windows using the concept of "Bring Your Own Vulnerability". Specifically, Concealed...
A new critical vulnerability in Netgear smart switches can be exploited by an attacker to potentially execute malicious code and...
Chipmaker AMD has addressed a vulnerability in PSP driver, tracked as CVE-2021-26333, that could allow an attacker to obtain sensitive...
The Mirai botnet starts exploiting the recently disclosed OMIGOD vulnerability to compromise vulnerable systems exposed online. Threat actors behind a...
For years, people have accused social media, and particularly image-driven sites like Instagram, of being bad for young people, particularly...
In a joint advisory the FBI, the United States Coast Guard Cyber Command (CGCYBER), and the Cybersecurity and Infrastructure Security...
 On Tuesday, Randy Westergren, a cybersecurity expert, published his study on the Motorola Halo+, a popular baby monitor. He revealed...
 Lenovo stated that two legacy IBM System x server models that were discontinued in 2019 are vulnerable to attack and...
 One of the most prominent hacktivists gangs, Anonymous, has returned. Security analysts have verified that the most recent attack by...
 A cyber-attack that had been sitting on the target organization's network for years stealing data was discovered during a McAfee...
Summary Last week, Microsoft reported the remote code execution vulnerability CVE-2021-40444 in the MSHTML browser engine. According to the company,...
A tool for generating multiple types of NTLMv2 hash theft files. ntlm_theft is an Open Source Python3 Tool that generates...
▒█████ ███▄ █ ▄▄▄█████▓ ██░ ██ ▓█████ █████ ██▓ ▓██ ██▓▒██▒ ██▒ ██ ▀█ █ ▓ ██▒ ▓▒▒▓██░ ██ ▓█...