BlackMatter Ransomware Victim: River City Construction
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
Elizabeth Denham, current head of the Information Commissioner’s Office (ICO), the UK’s data protection watchdog and the organization tasked to...
Facebook, neck-deep in virtual / augmented reality with the Oculus headset, continues to move things up a gear. It’s announced...
Any game with an online component can be at risk from a practice known as Real Money Trading (RMT), where...
The huge amount of data continuously collected via billions of sensors and devices that comprise the IoT can pose a...
Researchers at Proofpoint have detected a new series of email fraud campaigns trying to lure potential victims with the promise...
The ransomware gang Ragnar Locker implements a new strategy, which forces victims to pay the ransom and threatens to expose...
The U.S. Securities and Exchange Commission has released a new alert that fresh illegal schemes are targeting digital assets. According to...
On Wednesday, Thirachai Chantharotsiri, director of Bhumirajanagarindra Kidney Institute Hospital lodged a complaint that the personal information of over 40,000...
In case you don’t check our commit history on our GitHub on a daily basis, Empire 4.1 and Starkiller 1.9 were released to...
WWWGrep is a rapid search “grepping” mechanism that examines HTML elements by type and permits focused (single), multiple (file based...
Enumerate Domain Data is designed to be similar to PowerView but in .NET. PowerView is essentially the ultimate domain enumeration...
Security researchers from Broadcom’s Symantec linked a previously undocumented backdoor to the Chinese Grayfly operation. Experts from Broadcom’s Symantec linked...
The United Nations this week confirmed that its computer networks were hit by a cyberattack earlier this year, as first...
A Canadian man, who helped North Korean threat actors to launder stolen funds, plead guilty to laundering tens of millions...
The massive DDoS attack that has been targeting the internet giant Yandex was powered b a completely new botnet tracked...
A threat actor has leaked a list of almost 500,000 Fortinet VPN credentials, stolen from 87,000 vulnerable FortiGate SSL-VPN devices....
Last weekend, the largest DDoS attack in the history of the Runet was carried out on the company's servers. The...
Experts at ESET have probed a targeted espionage mobile campaign towards the Kurdish ethnic group, the campaign is in action...
Microsoft issued a warning to Windows users on Tuesday that attackers are actively exploiting an unpatched remote execution zero-day vulnerability...
The fast-food chain McDonald's mistakenly sent out emails with login credentials associated with a database for its Monopoly VIP game. McDonald's...
In their COVID-19 test-and-trace application, Indonesia investigated a probable security vulnerability that left 1.3 million individuals' data and health status...
The H1 2021 ICS threat report at a glance Percentage of ICS computers attacked During the first half of 2021...
This tool compiles some necessary tools for wifi auditing in a unix bash script with a user friendly interface....