Avaddon ransomware decryptor released, but operators quickly reacted
An expert released a free decryption tool for the Avaddon ransomware, but operators quickly updated malware code to make it...
An expert released a free decryption tool for the Avaddon ransomware, but operators quickly updated malware code to make it...
Lookout researchers provided details about two Android spyware families employed by an APT group tracked as Confucius. Researchers at mobile...
Often the most brilliant ideas are the most simple. The hard part is being the first one to come up...
Researchers at cybersecurity firm Lookout have published information on two recently discovered Android spyware families utilized by an advanced persistent...
Over the past weeks, WhatsApp messenger has started losing millions of users. They migrate to Telegram. In mid-January, almost 25...
The Central Bank of the Russian Federation summed up the results of the cyber exercises held in November-December 2020, designed...
Iran, one of the resourceful countries in Western Asia in terms of weapons and cyber intelligence has resumed its cyberespionage...
American cable and Internet giant Comcast was struck by a data breach few days back. An unprotected developer database with...
Powerful Chromium Browser to find XSS Vulnerabilites automatically while browsing web, it can detect many case scenarios with support for...
PatrOwl provides scalable, free and open-source solutions for orchestrating Security Operations and providing Threat Intelligence feeds. PatrowlHears is an advanced...
Advantech iView versions prior to 5.7.03.6112 suffer from an instance of "CWE-306: Missing Authentication For Critical Function." This vulnerability (CVE-2021-22652)...
A total of eight criminals have been arrested on 9 February as a result of an international police operation into...
SAP released seven new security notes on February 2021 Security Patch Day, including a Hot News note for a critical issue affecting...
Antivirus firm Emsisoft discloses a data breach, a third-party had access to a publicly exposed database containing technical logs. The...
Google and researchers at Stanford University have released an in-depth study analysing 5 months of phishing / malware mails sent...
Traditionally the second Tuesday of the month is Microsoft’s “patch Tuesday”. This is the day when they roll out all...
A hacker penetrated computer networks at Oldsmar, Florida, water treatment plant, remotely delivering a 100-fold boost in a chemical that...
Ness Digital Engineering Company, an Israeli-based U.S. IT provider was targeted via ransomware cyberattack affecting computer networks in India, United...
One of the trends of the last year, continuing in 2021, was the exploitation of the COVID-19 theme. Denis Legezo,...
The GitLab, a source code hosting website, and the Python Package Index (PyPI) portal both are flooded with advertisements for...
Recently a cyber attack has been reported by Tokyo Gas, the game’s developer and also known as a Japanese...
Patriot Linux is a HIDS for desktop users who wants real time graphical alerts when something suspicious happens Patriot detect:...
It's a simple tool for test vulnerability shellshock Autor: MrCl0wnBlog: http://blog.mrcl0wn.comGitHub: https://github.com/MrCl0wnLabTwitter: https://twitter.com/MrCl0wnLabEmail: [email protected] Shellshock (software bug)Shellshock, also known as...
Security orchestration and automation (SOAR) refers to a collection of software solutions and tools that organizations can leverage to streamline...