Security Affairs newsletter Round 310
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Experts warn of malware campaigns delivering the BazarLoader malware abusing popular collaboration tools like Slack and BaseCamp. Since January, researchers...
Google Project Zero security team has updated its vulnerability disclosure policy, it gives users 30 days to patch flaws before...
Navalny's team is now investigating and identifying the source of the leak. The team assured them that they did not...
On 15 April, the US Treasury Department put 25 Russian companies, six of which are IT companies, on its sanctions...
By now it's a well-known fact that most of the students are relying on online learning and video-conferencing apps due...
On Wednesday, IBM reported that its cyber-security unit has discovered more digital attacks targeting the global COVID-19 vaccine supply chain...
Cryptocurrency rewards portal, Celsius has witnessed a data breach, with the personal details of its clients disclosed by a third-party...
An open source serveo/ngrok alternative.DeployBuilds are made automatically for each commit to the repo and are pushed to Dockerhub. Builds...
Unlock an Android phone (or device) by bruteforcing the lockscreen PIN. Turn your Kali Nethunter phone into a bruteforce PIN...
SolarWinds supply chain attack also impacted six European Union institutions, European Commissioner for Budget and Administration confirmed. European Commissioner for...
Cybersecurity provider Juniper Networks addressed a critical vulnerability that could be exploited by attackers to remotely hijack or disrupt vulnerable...
14-year old Michael (not his real name) from Scandinavia first visited Omegle, the video online chat that has become hugely...
The National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) have...
For much of 2020, the most visible conversation about the US election and tech was related to deepfakes (images or...
The National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) jointly...
Due to a data breach, the account details of 21 million customers of ParkMobile, a prominent mobile parking app in...
The issue of data fraud has been on a rapid rise, as of late, and evidently so as data breaches...
The University of Hertfordshire has become the most recent victim of a spate of digital assaults against academic institutions after...
Scripted collection of system information valuable to a Forensic Analyst. IRTriage will automatically "Run As ADMINISTRATOR" in all Windows versions...
Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one tool. Uses...
The US government warned that Russian cyber espionage group SVR is exploiting five known vulnerabilities in enterprise infrastructure products. The...
Uptycs’ threat research team recently detected several variants of the Linux-based botnet malware family, “Gafgyt,”some of them re-used Mirai code. ...
Group-IB observed the North Korea-linked Lazarus APT group stealing cryptocurrency using a never-before-seen tool. In the last five years, JavaScript...