Mongolian Certificate Authority Hacked Eight Times
The unidentified hackers attacked the website of MonPass, one of Mongolia's leading certificate authorities, to backdoor its installation software with...
The unidentified hackers attacked the website of MonPass, one of Mongolia's leading certificate authorities, to backdoor its installation software with...
Scour is a modern module based AWS exploitation framework written in golang, designed for red team testing and blue team...
Featuressupport fuzzy search broken header dex. fix struct data of dex-header. compatible with all android version(frida supported). support loading as...
Threat actors compromised the servers of Mongolian certificate authority (CA) MonPass and used its website to spread malware. Hackers compromised...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Swedish supermarket chain Coop is the first company to disclose the impact of the recent supply chain ransomware attack that...
A supply attack by REvil ransomware operators against Kaseya VSA impacted multiple managed service providers (MSPs) and their clients. A...
In January 2021, the now defunct Iranian social media platform Raychat suffered a data breach that exposed 939 thousand unique...
Kaspersky said that the most professional, most aggressive espionage attacks are carried out by those who speak English, Russian and...
The second wave of deadly COVID-19 has left many countries’ economies in ruins, especially developing countries are undergoing a tough...
The Indian government seems to be gearing up in the wake of the growing threat of cyber-attacks against the Indian...
Currently, the US is the leading cyberspace power, but China is also closing in quickly and will be a tough...
Increasing safety measures led attackers to explore different ways to breach systems. The increasing number of firewall and ransomware attacks...
MacHound is an extension to the Bloodhound audting tool allowing collecting and ingesting of Active Directory relationships on MacOS hosts....
Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's People API....
Wizard Spider, the cybercrime gang behind the TrickBot botnet, is believed to be the author of a new ransomware family dubbed...
Microsoft is urging Azure users to update PowerShell to address a remote code execution vulnerability that was fixed earlier this...
A severe ransomware attack reportedly taking place now against the popular Remote Monitoring and Management software tool Kaseya VSA has...
The NSA, FBI, and CISA, in cooperation with the UK’s National Cyber Security Centre (NCSC), have issued a report that...
Although many cyberattacks made major headlines in the US this year, most of the customers are still not aware of...
Threat actors have breached a server belonging to MonPass, a major certification authority (CA) in Mongolia in East Asia, and...
One of the UK's leading cyber officials has cautioned of a rising threat to Ireland's cross-border telecoms, energy, and transportation...
Recently, a massive cyberattack took place while Russian president Vladimir Putin was answering citizen queries through the state-broadcast Rossiya 24...
Experts of the cybersecurity company Group-IB note that fraudsters skillfully disguise fake payment pages: they often contain logos of the...