Hades ransomware gang targets big organizations in the US
Accenture security researchers published an analysis of the latest Hades campaign, which is ongoing since at least December 2020. Accenture’s Cyber Investigation &...
Accenture security researchers published an analysis of the latest Hades campaign, which is ongoing since at least December 2020. Accenture’s Cyber Investigation &...
If you or anyone you know is committing the below social media sins, it’s time to change that habit of...
Two new vulnerabilities have been found in Intel processors. They are undocumented capabilities of the manufacturer that allow hijacking control...
AdaptiveMobile security researchers have discovered a major flaw in the architecture of 5G network slicing and virtualized network functions. This...
White hat hackers have disclosed a significant leak of client information by online forex dealer FBS Markets. This incorporates a...
The ransomware gang REvil introduced a special malware feature that allows attackers to reboot infected devices after encryption. REvil emerged...
A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE...
This is a collection of tools you may like if you are interested on reverse engineering and/or malware analysis on...
Solarwinds released security updates that address multiple vulnerabilities, including two flaws that be exploited by attackers for remote code execution....
The Federal Bureau of Investigation (FBI) issued an alert to warn that the Mamba ransomware is abusing the DiskCryptor open...
The OpenSSL Project addresses two high-severity vulnerabilities, including one related to verifying a certificate chain and one that can trigger...
The CyberNews investigation team found 62,174 potentially vulnerable unpatched Microsoft Exchange Servers. A number of entities in the US and...
Facebook has closed accounts used by a China-linked APT to distribute malware to spy on Uyghurs activists, journalists, and dissidents living...
Researchers at Guardicore have identified a new infection vector being used by the Perkiler malware where internet-facing Windows machines are...
The enormous work messaging platform Slack quickly reversed course yesterday, promising to revise a brand-new direct message feature that could...
The Anonymous hacker group published an analysis of documents belonging to various British government agencies, including the Foreign Office, according...
A database with the names and ID numbers of all the eligible voters in Israel was leaked online by anonymous...
A malware that has verifiably targeted exposed Windows machines through phishing and exploit kits have been retooled to add new...
The Clop ransomware group has officially published online the grades and social security numbers for students at the University of...
Figures Indicator H1 2020 H2 2020 2020 Global percentage of attacked ICS computers 32.6% 33.42% 38.55% Percentage of attacked ICS...
Find exposed AWS cloud assets that you did not know you had. A comprehensive asset inventory is step one to...
OSINT tool to get information from a github profile and find GitHub user's email addresses leaked on commits.How does this...
Mitigate threats by going on the offensiveWhile the definition of threat hunting may be straightforward—proactively hunting for threats—the reality of...
Threat actors are offering fake COVID-19 test results and vaccination certificates in blackmarkets and hacking forums on the Dark Web....