Groove ransomware group calls on other ransomware gangs to hit US public sector
Groove ransomware operators call on other ransomware groups to stop competing and join the forces to fight against the US....
Groove ransomware operators call on other ransomware groups to stop competing and join the forces to fight against the US....
Darkside and BlackMatter ransomware operators have moved a large amount of their Bitcoin reserves after the recent shutdown of REvil’s...
It’s widely known, and endlessly repeated, that the last, best line of defence against the potentially devastating effects of a...
Gaming security is getting a lot of attention at the moment. Rightly so; it’s a huge target for scammers and...
For those of you that remember the fuss about the Y2K bug, this story may sound familiar. The Cybersecurity &...
PortBender is a TCP port redirection utility that allows a red team operator to redirect inbound traffic destined for one...
FIN7 hacking group created fake cybersecurity companies to hire experts and involve them in ransomware attacks tricking them of conducting...
Bitdefender researchers discovered a new Rootkit named FiveSys that abuses Microsoft-Issued Digital Signature signature to evade detection. FiveSys is a...
Evil Corp cybercrime gang is using a new ransomware called Macaw Locker to evade US sanctions that prevent victims from...
A vulnerability in the WinRAR is a trialware file archiver utility for Windows could be exploited by a remote attacker...
Basic TutorialHere you will find privilege escalation tools for Windows and Linux/Unix* and MacOS.These tools search for possible local privilege...
The United States Department of Justice sentenced two individuals that were providing bulletproof hosting to various malware operations. The United...
For the third time in a month Google has issued an update to patch for several security issues. This time...
Exploit kits (EK) are not as widespread as they used to be. One of the reasons is likely that most...
NTFSTool is a forensic tool focused on NTFS volumes. It supports reading partition info (mbr, partition table, vbr) but also...
The Commerce Department’s Bureau of Industry and Security (BIS) would ban U.S. firms from selling hacking tools to authoritarian regimes....
Threat actors are continually looking for better ways to target organizations, here are the top five attack vectors to look...
Experts at Kaspersky have been investigating various computer incidents on a daily basis for over a decade. Having been in...
A Cookie Theft malware was employed in phishing attacks against YouTube creators, Google’s Threat Analysis Group (TAG) warns. Financially motivated...
Researchers warn of a new evolution of the PurpleFox botnet, operators included exploits and leverage WebSockets for C2 communication. Researchers...
Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).MetabadgerPurpose and functionalityDiagnose...
A student at a high school in Cook County successfully hacked into the Internet-of-Things (IoT) devices of one of the...
Snapchat is an instant messaging app popular with youngsters that allows users to send pictures and videos that are only...
Tech giant Acer was hacked again in a few days, after the compromise of the servers in India, threat actors...