China-Based Hackers Luring Indians into Fake Tata Motors Scam
On Thursday, cyber-security researchers in India announced the discovery of a malicious free present marketing campaign managed by China-based hackers...
On Thursday, cyber-security researchers in India announced the discovery of a malicious free present marketing campaign managed by China-based hackers...
GitHub recently updated its insights to include repositories that contain registry secrets for PyPI and RubyGems. This approach protects millions...
The Dutch newspaper Volkskrant on the day of the start of the hearing on the crash of the Malaysian Boeing...
The FBI has issued a warning to private sector enterprises about scammers masquerading construction companies in business email compromise (BEC)...
Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external...
Cyber Range deployment of HELK and Velociraptor! Automated terraform deployment of one system running HELK + Velociraptor server with one...
Experts spotted a new mysterious malware that was used to collect a huge amount of data, including sensitive files, credentials,...
Qatari government-funded international Arabic news channel Al Jazeera announced to have blocked a series of disruptive cyberattacks aimed at its...
The US Department of Justice seized the servers and domains of the popular cybercrime marketplace SlilPP. The US Department of Justice...
Threat hunting and adversarial cyber intelligence company Group-IB published a comprehensive analysis of fraud cases on a global scale. Group-IB, a...
Hackers breached the network of the gaming giant Electronic Arts (EA) and have stolen roughly 780 GB of data, including game...
a so-called “nameless” undetected malware stole a database in the cloud that contained some 1.2 terabytes of files, cookies, and...
University of College London campus. Researchers identified a number of promising machine learning techniques that may help improve detection of...
Back in November, gaming giant Capcom suffered a ransomware attack. In its press notification, it mentioned the various types of...
Journalists at the Dutch newspaper “De Volkskrant” have reported that the country’s intelligence service, AIVD, discovered in 2017 that Russian...
In an international sting operation targeting drug suppliers led to an arrest of a man. The suspect's face was blurred...
ADATA, a Taiwan-based leading memory and storage manufacturer, was forced to take its systems offline after a ransomware attack crippled...
Earlier this morning, the Ministry of Labour and Social Economy of the Spanish government witnessed a cyber-attack. At the moment,...
On Tuesday, Trend Micro released a case study analyzing Nefilim, a ransomware gang that the researchers believe is or was...
A framework that aids in creation of self-spreading software Requirementsgo get -u github.com/redcode-labs/Coldfire go get -u github.com/yelinaung/go-haikunator New in v....
SQL / SQLI tokenizer parser analyzer. For C and C++ PHP Python Lua Java (external port) (https://github.com/p0pr0ck5/lua-ffi-libinjection) (external port) See...
The beef producer JBS has admitted to have paid an $11 million ransom to the REvil ransomware gang after the...
Google this week addressed 14 vulnerabilities in the Chrome browser, including a zero-day flaw that has been exploited in the...
Russia-linked cyberspies breached the internal network of Dutch police in 2017 while the authorities were investigating the crash of the...