JSWorm: A Notorious Ransomware
The ransomware threat environment has been shifting over the last few years. Following the major ransomware outbreaks of 2017, such...
The ransomware threat environment has been shifting over the last few years. Following the major ransomware outbreaks of 2017, such...
The hacking community of Agrius has switched from a strictly destructive wiper malware to a mix of wiper and ransomware...
All statistics in this report are from the global cloud service Kaspersky Security Network (KSN), which receives information from components...
Multi-platform toolkit for an interactive C2C DNS shell, by using DNS-Black-Cat, you will be able to execute system commands in...
qvm-create-windows-qube is a tool for quickly and conveniently installing fresh new Windows qubes with Qubes Windows Tools (QWT) drivers automatically....
Google experts discovered a new variant of Rowhammer attack against RAM memory cards that bypasses all current defenses Google researchers...
The Belgian interior ministry was targeted by a “sophisticated” cyber attack, a spokesman told RTBF public television on Tuesday. The...
VMware addresses a critical remote code execution (RCE) flaw in the Virtual SAN Health Check plug-in that impacts all vCenter...
An Iran-linked threat actor tracked as Agrius employed data-wipers disguised as ransomware to destroy targeted IT infrastructure. Researchers from cyber-security...
A flaw in Pulse Connect Secure VPN could allow an authenticated remote attacker to execute arbitrary code with elevated privileges....
Following a devastating cyberattack on the Colonial Pipeline, the Transportation Security Administration—which sits within the government’s Department of Homeland Security—will...
Incognito mode is the name of Google Chrome’s private browsing mode, but it’s also become the catch-all term used to...
If you’re worried about the risk of insider threats, you’re not alone. It can affect anyone, even the FBI. A...
According to cybersecurity experts, the fall in the cryptocurrency exchange rates may cause another increase in DDoS attacks. The fact...
Security researchers have published a report on the modus operandi of the cybercriminals who are using malware, a key from...
Over the last seven months, the number of Bitcoin scams has increased dramatically. The scams began around October 2020 and...
After the sudden spike in cryptocurrency this year, news outlets and various traders have been thinking about who might be...
This script will scan your codethe script can find check_file_upload issues host_header_injection SQl injection insecure deserialization open_redirect SSRF XSS LFI...
Steal Apache Solr instance Queries with or without a username and password. DISCLAIMER: This project should be used for authorized...
Trend Micro fixed some flaws in Trend Micro Home Network Security devices that could be exploited to elevate privileges or...
Apple has addressed three zero-day vulnerabilities in macOS and tvOS actively exploited in the wild by threat actors. Apple has...
The audio equipment manufacturer Bose Corporation said it was the victim of a ransomware attack that took place earlier this...
US banks are giving the green light to the adoption of facial recognition technology, while authorities provide regulations and updates...
Attackers could exploit a set of Bluetooth vulnerabilities, affecting the Core and Mesh Profile specifications, to conduct man-in-the-middle (MitM) attacks. Researchers at...