Group-IB spotted a new fraud scheme to steal money from Zoom users
Under the guise of receiving monetary compensation "in connection with COVID-19" or for subscribing to the service, users are lured...
Under the guise of receiving monetary compensation "in connection with COVID-19" or for subscribing to the service, users are lured...
In summer 2020 we uncovered a previously unknown multi-module C++ toolset used in highly targeted industrial espionage attacks dating back...
c41n is an automated Rogue Access Point setup tool. c41n provides automated setup of several types of Rogue Access Points,...
As indicated by sources like vulndb & cve, on a daily basis, approximately 50 new vulnerabilities become known to industry...
For many security teams, vulnerability risk management can feel like an endless climb. The truth is, no IT environment will...
Posted by RedTeam Pentesting GmbH on Oct 08Advisory: Denial of Service in D-Link DSR-250N RedTeam Pentesting discovered a Denial-of-Service vulnerability...
There’s no denying the coronavirus pandemic is having a significant impact on the way we use technology. Some changes feel...
Representatives of big business warned that banning modern website encryption protocols in Russia is tantamount to disconnecting the country from...
Kaspersky Lab experts discovered a targeted cyber espionage campaign, where attackers infect computers with malware that collects all recent documents...
India and Japan finalize a cybersecurity deal as both agreed to the need for vigorous and 'resilient digital and cyber...
CSRFER is a tool to generate csrf payloads, based on vulnerable requests. It parses supplied requests to generate either a...
GHunt is an OSINT tool to extract a lot of informations of someone's Google Account email. It can currently extract...
Each year, Rapid7 penetration testers complete hundreds of internally and externally based penetration testing service engagements. This post is part...
This blog post was authored by Hossein Jazi and Jérôme Segura. On September 17th, we discovered a new attack called...
Cloudfare has announced a new feature for their paid customers to set up alert notifications for when their website or...
The shopping isn't finished once you've purchased your item. If you've ever done shopping online, then you know all about...
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN...
IoTMap is a tool that models IoT networks using one or multiple protocols simultaneously. This is work in progress, as...
We are delighted to announce that Log Search now supports grouping by multiple fields in your log data. By running...
On Oct. 1, the United States Treasury Department Office of Foreign Assets Control (OFAC) issued an advisory concerning ransomware payments...
Posted by b1nary on Oct 06# Exploit Title: Student Result Management System 1.0 - Multiple SQL Injection Vulnerabilities # Date:...
Posted by Stefan Marsiske via Fulldisclosure on Oct 06GAEN Protocol Metadata Deanonymization and Risk-score Inflation Issues (CVE-2020-24722) Summary The TX...
Posted by Rodolfo Augusto do Nascimento Tavares on Oct 06Hello, all Could you please publish the item below? I attached...
Posted by Red Timmy Security on Oct 06On June 21st 2020 Fortinet has released a security bulletin for its FortiSIEM...