A week in security (August 23 – August 29)
Last week on Malwarebytes Labs: Patch now! Microsoft Exchange is being attacked via ProxyShellRealtek-based routers, smart devices are being gobbled...
Last week on Malwarebytes Labs: Patch now! Microsoft Exchange is being attacked via ProxyShellRealtek-based routers, smart devices are being gobbled...
The Phorpiex malware's creators have shut down their botnet and are selling the source code on a dark web cybercrime...
Ragnarok ransomware group has decided to abandon its operations and has reportedly published the master key that can decrypt files...
Researchers at the Cofense Phishing Defense Center (PDC) have been able to dig further into the addressing characteristics of one...
In elFinder, an open-source web file organizer, security researchers from SonarSource identified five flaws that form a severe vulnerability chain.The...
According to a copy of the email and a cyber security researcher, Microsoft warned thousands of its cloud computing customers,...
Reg1c1de is a tool that scans specified registry hives and reports on any keys where the user has write permissions...
Speakeasy is a portable, modular, binary emulator designed to emulate Windows kernel and user mode malware. Check out the overview...
The US DoJ announced a new Cyber Fellowship program for training prosecutors and attorneys on cybersecurity. The US DoJ announced...
Who is behind the massive and prolonged Distributed Denial of Service (DDoS) attack that hit the Philippine human rights alliance Karapatan?...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert urging enterprises to address the recently disclosed vulnerability in...
The Boston Public Library was victim of a cyberattack that crippled its computer network, the library revealed in a statement...
So far, Konni RAT has managed to evade detection as only 3 security solutions on VirusTotal were able to detect...
No one ever wants a group of hackers to say about their company: “We had the keys to the kingdom.”...
Threat actors responsible for the BazaLoader malware designed a brand-new bait to trick website owners into opening malicious files: fake...
The Boston Public Library (BPL) announced on 27th August that its network was compromised on Wednesday, resulting in a system-wide...
The federal police's Computer Crime Unit is looking into an identity fraud case concerning Catherine De Bolle, the executive head...
The Federal Bureau of Investigation (FBI) has issued a security alert regarding the Hive ransomware attacks, which provides technical data...
Read the blog posts here: https://iwantmore.pizza/posts/PEzor.html https://iwantmore.pizza/posts/PEzor2.html https://iwantmore.pizza/posts/PEzor3.html https://iwantmore.pizza/posts/PEzor4.html InstallationThe install.sh is designed to work on a Kali Linux distro....
M.E.A.T. - Mobile Evidence Acquisition ToolkitMeet M.E.A.T! From Jack Farley - BlackStone Discovery This toolkit aims to help forensicators perform...
The name of the sportswear manufacturer Puma appeared on the dark web marketplace of stolen data Marketo, threat actors claim...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The Philippine human rights alliance Karapatan has suffered a massive and prolonged Distributed Denial of Service (DDoS) attack, Qurium organizations linked it...
Taiwan vendor Synology announced that recently disclosed vulnerabilities (CVE-2021-3711 and CVE-2021-3712) in the OpenSSL impact some of its products. Taiwanese company Synology...