Hacker Behind $600 Million Crypto Heist Returned Stolen Funds
The hacker behind the biggest cryptocurrency heist of all time has finally handed access to the final tranche of stolen...
The hacker behind the biggest cryptocurrency heist of all time has finally handed access to the final tranche of stolen...
According to experts, some 38 million records from over a thousand web apps that use Microsoft's Power Apps portals platform...
A notorious hacking group, known as Shiny Hunters, is reportedly selling a database containing private details of 70 million AT&T...
A phishing attack known as the "Google Docs worm" proliferated over the internet in May 2017. It impersonated Google Docs...
A threat actor from North Korea has indeed been found exploiting two flaws in the Internet Explorer to attack individuals...
The video game industry is soaring, not in the least thanks to the lockdowns, which forced people to look for...
Create fake certs for binaries using windows binaries and the power of bat files Over the years, several cool tools...
Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware...
A researcher disclosed technical details of a critical remote code execution vulnerability, tracked as CVE-2020-25223, patched last year. In September,...
A zero-day vulnerability in Razer Synapse could allow threat actors to gain Windows admin privileges by plugging in a Razer...
Health organization Memorial Health System was hit by a disruptive cyber attack that forced it to cancel surgeries and divert...
Google disclosed the details of a Windows AppContainer vulnerability because Microsoft initially had no plans to fix it. Google Project...
According to a Fox News correspondent, the US State Department was hit by a cyberattack, and the Department of Defense...
Specialists of the Israeli company Kela analyzed more than 1 thousand ads for the sale of initial access to the...
As the threat of ransomware attacks increases, the U.S. shipping industry is facing a particularly high resistance in safeguarding its...
Muddled phone SMSs and phantom calls attack smartphones in a new wave of hoaxes throughout Australia, including the one that...
A new extortion fraud attempts to profit from the recent Pegasus iOS spyware attacks to threaten victims to pay a...
keimpx is an open source tool, released under the Apache License 2.0. It can be used to quickly check for...
SQLancer (Synthesized Query Lancer) is a tool to automatically test Database Management Systems (DBMS) in order to find logic bugs...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
T-Mobile data breach could be worse than initially thought, an update to the investigation reveals that over 54 million individuals...
The U.S. State Department was recently hit by a cyber attack, the Department of Defense Cyber Command might have suffered...
A new ransomware gang named LockFile targets Microsoft Exchange servers exploiting the recently disclosed ProxyShell vulnerabilities. A new ransomware gang...
Mozi, a peer-to-peer (P2P) malware known to target internet-of-things devices, has developed new capabilities to target network gateways manufactured by...