Revisiting the NSIS-based crypter
This blog post was authored by hasherezade NSIS (Nullsoft Scriptable Install System) is a framework dedicated to creating software installers....
This blog post was authored by hasherezade NSIS (Nullsoft Scriptable Install System) is a framework dedicated to creating software installers....
Cybercriminals who targeted hospitals in New Zealand’s Waikato district have published the stolen patient data to the local media outlets,...
Since the Covid pandemic intensified digitalization and remote working, the banking sector is becoming more vulnerable to cybercrime, according to...
In the wild, CERT Coordination Center (CERT/CC) in Carnegie Mellon University alerts about a Checkbox Survey vulnerability that might enable...
Proofpoint identified the phishing attempt in early May, which entailed hackers creating a phoney movie-streaming website named BravoMovies and stocking...
Targeted attacks Putting the ‘A’ into APT In December, SolarWinds, a well-known IT managed services provider, fell victim to a...
The statistics presented here draw on detection verdicts returned by Kaspersky products as provided by users who consented to share...
These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly...
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common...
Bucky is an automatic tool designed to discover S3 bucket misconfiguration, Bucky consists up of two modules Bucky firefox addon...
A security researcher discovered a bug in PatchGuard Windows security feature that can allow loading unsigned malicious code into the...
Hackers are attempting to exploit the return to the “new normal” after the governments are removing restrictions imposed in response...
It’s been a busy few weeks for facial recognition technology. Its oft-maligned abilities frequently wind up in tales of privacy...
Last week on Malwarebytes Labs we discussed VPN Android apps, how even the FBI has to deal with insider threats,...
The scientific and industrial company "High Technologies and Strategic Systems" (HT and SS SIJSC) will develop a computer program for...
Hewlett Packard Enterprise (HPE) has released a security update to patch critical zero-day remote code execution (RCE) vulnerability in its...
According to security firm FireEye, a massive Chinese espionage operation against US and European government entities includes four new hacking...
Several hacker groups that are supposed to support Chinese long-term economic goals continue in the defense, high-tech, public, transportation, and...
CERT Kaiju is a collection of binary analysis tools for Ghidra. This is a Ghidra/Java implementation of some features of...
This repository has been made basing onto the already existing MiscTool, so big shout-out to rasta-mouse for releasing them and...
Interpol has intercepted $83 million in illicit funds transferred from victims to the accounts used by crooks. An operation conducted...
Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature....
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Qihoo 360 NETLAB spotted a new backdoor dubbed Facefish that could allow attackers to take over Linux systems and steal...