Group-IB informed about the distribution of fake news about 20 thousand coronaviruses infected in Moscow
A fake audio recording appeared on the Internet, where the girl reports about 20 thousand cases of coronavirus COVID-19 in...
A fake audio recording appeared on the Internet, where the girl reports about 20 thousand cases of coronavirus COVID-19 in...
To compile open the project in Visual Studio and build for release. Two DLLs will be output to the Release...
Ghost Framework is an Android post exploitation framework that uses anAndroid Debug Bridge to remotely access an Android device. Ghost...
Moral panic is a fascinating topic, and often finds itself tied up in the cutting edge-technology of the times once it...
Group-IB, a company that specializes in preventing cyberattacks has revealed new fake messages about the spread of coronavirus over the...
A group of sophisticated hackers slammed Amazon Web Services (AWS) servers. The hackers established a rootkit that let them manually...
Fraudsters several thousand times tried to illegally take advantage of discount bonuses of Russians in 2019.Some attackers gained access to...
The technique of distributing malware under the guise of legitimate software updates is not new. As a rule, cybercriminals invite...
This is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker...
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is...
This post describes CVE-2019-5648, a vulnerability in the Barracuda Load Balancer ADC. A malicious actor who gains authenticated, administrative access...
The Android banking trojan Geost was first revealed in a research by Sebastian García, Maria Jose Erquiaga and Anna Shirokova...
“You should have asked for the presence of a digital detective,” Karen said when I told her what happened at...
The travel details and email addresses of around 10,000 commuters who used free wi-fi provided at UK railway stations were...
This script aims to enumerate common Windows security misconfigurations which can be leveraged for privilege escalation and gather various information...
Monitor twitter stream.TwitWork use the twitter stream which allows you to have a tweets in real-time.There is an input that...
About one year ago, my colleague Trevor O’Donnal wrote a blog post, “Why a 17-Year Veteran Pen Tester Took the...
By David Fiser (Senior Cyber Threat Researcher) Threat Modeling for Online Coding Platforms Before cloud integrated development environments (IDEs) became...
In 2013, 30-year-old Axton Betz-Hamilton received an angry phone call from her father two weeks after her mother, Pam, died....
A cybersecurity expert recently found a vulnerability in FB's "login with the Facebook feature." According to the expert, the vulnerability...
Amazon Transcribe, the AWS-based 'speech-to-text service, recently came up with a significant new feature which, if executed effectively, can spontaneously...
Reports mention that recently attackers were found exploiting the latest version of the “Remote Desktop ActiveX” which was developed for...
All in one tools for Information Gathering.Instagram: Capture the RootScreenshotsRead MeInitially, you need to create a project where you will...
WiFi Passview is an open source batch script based program that can recover your WiFi Password easily in seconds. This...