BlackMatter Ransomware Victim: Pulmuone Co[.], Ltd[.]
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
A tool for generating multiple types of NTLMv2 hash theft files. ntlm_theft is an Open Source Python3 Tool that generates...
▒█████ ███▄ █ ▄▄▄█████▓ ██░ ██ ▓█████ █████ ██▓ ▓██ ██▓▒██▒ ██▒ ██ ▀█ █ ▓ ██▒ ▓▒▒▓██░ ██ ▓█...
A spokesman for the authority running Germany’s September 26 general election confirmed that hackers briefly disrupted its website last month....
A new malware written in Golang programming language, tracked as Capoae, is targeting WordPress installs and Linux systems. Akamai researchers...
Security researchers spotted a new malware that uses Windows Subsystem for Linux (WSL) to evade detection in attacks against Windows...
The FBI, CISA, and the Coast Guard Cyber Command (CGCYBER) warn of state-sponsored attacks that are actively exploiting CVE-2021-40539 Zoho...
Microsoft revealed that multiple threat actors are exploiting the recently patched Windows MSHTML remote code execution security flaw (CVE-2021-40444). Microsoft...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
You may have seen the Dark Web referenced in popular TV shows and have gotten the wrong idea, or if...
We all know cookies as tasty baked treats that we love to eat, but computer cookies are quite different. Although...
Jay Tipton, chief executive for the Managed Service Provider (MSP) Technology Specialists, remembers his Fourth of July weekend this year...
HP has released a patch to fix a flaw in the HP OMEN driver. As far as we know the...
The Krita digital painting application is currently being targeted by ransomware authors. Available on Steam and other platforms, it’s a powerful...
Earlier this year in June, a security researcher from security firm Sonatype uncovered six malicious payloads in the official Python...
A Russian hacker who collaborated with the well-known REvil group confirmed that cybercriminals returned to active work after a two-month...
The development and sudden boom in IoT equipment in the healthcare sector have resulted in the surge of cyber attacks....
On Tuesday, Massachusetts Attorney General Maura Healey announced that she will look into the cyberattack on T-Mobile US Inc (TMUS.O),...
A security flaw in the WooCommerce Multi Currency plugin might allow any consumer to alter product prices in online stores....
This summer, several events that were postponed from 2020 due to the pandemic took place. Some of them interested children,...
REvil Happy Blog NOTE: The information on this page is automated and scraped directly from the Revil Happy Blog page...
A fast tool to check missing hosted DNS zones that can lead to subdomain takeover. What is a DNS takeover?DNS...
Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)Creation of this Script is based on some reverse...
Plution is a convenient way to scan at scale for pages that are vulnerable to client side prototype pollution via...