threatintel
HID Mercury Access Controller flaws could allow to unlock Doors
Experts found vulnerabilities in HID Mercury Access Controllers can be exploited by attackers to remotely unlock doors. Researchers from security...
Pulsar – Data Exfiltration And Covert Communication Tool
Pulsar is a tool for data exfiltration and covert communication that enable you to create a secure data transfer, a...
Iran-linked Lyceum APT adds a new .NET DNSÂ Backdoor to its arsenal
Iran-linked Lyceum APT group uses a new .NET-based DNS backdoor to target organizations in the energy and telecommunication sectors. The...
PACMAN, a new attack technique against Apple M1 CPUs
PACMAN is a new attack technique demonstrated against Apple M1 processor chipsets that could be used to hack macOS systems....
WhiteBeam – Transparent Endpoint Security
Transparent endpoint security Features Block and detect advanced attacks Modern audited cryptography: RustCrypto for hashing and encryption Highly compatible: Development...