North Korean Lazarus Group Attacks South African Freight Via New Weapon
The North Korean-backed Lazarus hacking group employed a new backdoor in targeted attacks against a South African freight and logistics...
The North Korean-backed Lazarus hacking group employed a new backdoor in targeted attacks against a South African freight and logistics...
As per the information provided by the website ‘Have I Been Pwned’, Carding Mafia, a credit card stealing and trading...
Recently, we’ve found malicious code in version 3.17.18 of the official client of the APKPure app store. The app is...
Command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters...
Redcloud is a powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud's...
The Pwn2Own 2021 hacking competition was concluded, participants earned more than $1.2 million, the greatest total payout ever. The Pwn2Own...
CISA released a Splunk-based dashboard for post-compromise activity in Microsoft Azure Active Directory (AD), Office 365, and MS 365 environments. The Cybersecurity...
A threat actor has sold almost 900,000 gift cards and over 300,000 payment cards on a cybercrime forum on the...
Wizcase experts discovered a security flaw in the open-source learning platform Moodle that could allow accounts takeover. At the beginning...
Two Dutch white-hat security specialists entered the annual computer hacking contest Pwn2Own, managed to find a Remote Code Execution (RCE)...
Ransomware operators shut down two production facilities having a place with a European manufacturer in the wake of conveying a...
The classic scheme to defraud Russian bank clients with the help of malicious emails is experiencing a second birth. Now...
Two IT universities of Ireland the National College of Ireland (NCI) and the Technological University of Dublin have been hit...
Gigaset, a German device maker, was recently hit with a supply chain attack, the hackers breached a minimum of one...
Security researchers have noted an increase in the misuse of legitimate services such as Google Forms and Telegram for gathering...
Maximizing BloodHound.DescriptionNew Release: dpat - The BloodHound Domain Password Audit Tool (DPAT) A simple suite of tools: get-info - Pull...
NtHiM - Super Fast Sub-domain Takeover DetectionInstallationMethod 1: Using Pre-compiled BinariesThe pre-compiled binaries for different systems are available in the...
The following blog was co-authored by Caitlin Condon and Bob Rudis, also known (in his own words) as “some caveman...
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
This blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1The DivvyCloud by Rapid7 team has had...
Group-IB, a global threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Swarmshop card shop have been leaked...
Pwn2Own 2021 – Day 2: a security duo earned $200,000 for a zero-interaction Zoom exploit allowing remote code execution. One...
Days after a massive Facebook data leak made the headlines, 500 million LinkedIn users are being sold online, seller leaked 2 million...
Cisco has addressed a critical pre-authentication remote code execution (RCE) vulnerability in the SD-WAN vManage Software. Cisco has addressed multiple...