SEC warns of investment scams related to Hurricane Ida
The US Securities and Exchange Commission warns investors of potential investment scams that leverages Hurricane Ida as a bait. The US Securities and...
The US Securities and Exchange Commission warns investors of potential investment scams that leverages Hurricane Ida as a bait. The US Securities and...
Node.js maintainers have launched a major update to the npm package "tar" (aka node-tar) that resolves five critical safety flaws,...
Railway and other wireless communication devices developed by Moxa have been affected by 6p vulnerabilities. Moxa is a Taiwan based...
The Gutenberg Template Library & Redux Framework plugin for WordPress, which is deployed on over 1 million websites, has two...
Trojan-Banker QakBot, also known by the names - QBot, QuackBot, and Pinkslipbot, is a modular information stealer that has been...
Autodesk has disclosed that it was also targeted by the Russian state hackers behind the large-scale SolarWinds Orion supply-chain assault,...
Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities... It's implemented...
A collaborative free open-source Command & Control integration framework that allows developers to concentrate on the core function and goal...
Apple will delay the introduction of its new child pornography protection tools due to a heated debate raised by privacy...
FIN7 cybercrime gang used weaponized Windows 11 Alpha-themed Word documents to drop malicious payloads, including a JavaScript backdoor. Anomali Threat...
The complete source code for the Babuk ransomware is available for sale on a Russian-speaking hacking forum. A threat actor...
USCYBERCOM is urging organizations to patch a critical CVE-2021-26084 flaw in Atlassian Confluence Server and Data Center, ahead of the...
The Conti ransomware operators are targeting Microsoft Exchange servers leveraging recently disclosed ProxyShell vulnerability exploits. The Conti ransomware gang is...
The FBI has issued a Private Industry Notification (PIN) about cybercriminal actors targeting the food and agriculture sector with ransomware...
It’s a good idea to try and keep certain things private. For example, people have been using anonymous email services...
Users of Voipfone's UK business broadband and Voice-over-Internet-Protocol (VoIP) services have reported to ISPreview.co.uk that the supplier has been facing...
Awillix specialists discovered vulnerabilities in bank chatbots that could allow fraudsters to transfer money without the knowledge of customers. Positive...
White Hat hackers revealed a set of vulnerabilities named as BrakTooth, which affects commercial bluetooth gadgets, raising suspicions about vendor's...
Citing the growing threat in cyberspace, the Parliamentary Standing Committee on Home Affairs has advised the Indian government to block...
A 15-year-old cybercrime anonymity service called VIP72, in the past, allowed a large number of cybercriminals to cover up their...
Introduction On August 31, 2021 we ran a joint webinar between VirusTotal and Kaspersky, with a focus on YARA rules...
Python parser for CobaltStrike Beacon's configuration DescriptionUse parse_beacon_config.py for stageless beacons, memory dumps or C2 urls with metasploit compatibility mode...
Django Web application for performing Static Analysis and detecting malware in Android APKsIn each of the scans, it would have...
Mandiant researchers spotted a new malware family, dubbed PRIVATELOG, that relies on the Common Log File System (CLFS) to evade...