Google Voice Disruption Caused by Expired TLS Certificates
Google has affirmed that a Google Voice malfunction that had impacted the majority of telephone service users this month was...
Google has affirmed that a Google Voice malfunction that had impacted the majority of telephone service users this month was...
The database contains email addresses, passwords and usernames of Russian users. This information can be used by hackers to obtain...
A simple command line tool using which you can skip phone number based SMS verification by using a temporary phone...
OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security Scanner. Note: AWSS is the older name...
French multinational dairy products corporation Lactalis discloses cyberattack, but claimed that had no evidence of a data breach. France-based dairy...
Recorded Future researchers uncovered a campaign conducted by Chinese APT41 group targeting critical infrastructure in India. Security researchers at Recorded...
JFC International, a major wholesaler and distributor of Asian food products in the United States, was hit by ransomware. JFC...
The Javascript-based infection framework for the Gootkit RAT was enhanced to deliver a wider variety of malware, including ransomware. Experts...
In January 2021, Oxfam Australia was the victim of a data breach which exposed 1.8M unique email addresses of supporters...
In August 2020, the Dutch ticketing service Ticketcounter inadvertently published a database backup to a publicly accessible location where it...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we...
Only days after the conclusion of its long-running fight with the Office of the Attorney General of New York, Tether...
According to the sources nearly half of the emails, phishing attacks in the year 2020 aimed to swipe credentials...
Among every state-sponsored hacking group that has attacked the U.S power grid, and went beyond to compromise American Electric Utilities,...
The US Senate’s select committee has blamed Russia for the massive intelligence operation that infiltrated SolarWinds, a Texas-based software company,...
Nation-states are employing cybercriminals for hacking activities to perpetrate assaults in order to conceal their own presence. An e-security report...
These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. The...
Halogen is a tool to automate the creation of yara rules against image files embedded within a malicious document.Halogen helppython3...
StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution...
This blog is part of an ongoing series sharing key takeaways from Rapid7’s 2020 Cloud Security Executive Summit. Interested in...
Top executives of the software firm SolarWinds blamed an intern for having used a weak password for several years, exposing...
ByteDance, the company behind TikTok, agreed to pay $92 million in a settlement to U.S. users for illegal data collection....
The National Security Agency (NSA) published a document to explain the advantages of implementing a zero-trust model. The National Security...
During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting...