US-CERT Bulletin (SB21-347):Vulnerability Summary for the Week of December 6, 2021
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Boffins discovered bugs in WiFi chips that can be exploited to extract passwords and manipulate traffic by targeting a device’s...
Haptyc is a python library which was built to add payload position support and Sniper/Clusterbomb/Batteringram/Pitchfork attack types into Turbo Intruder....
There are many types of phishing attack nowadays, to the extent it can be tricky to keep up with them...
The U.S. CISA added 13 new vulnerabilities to the Known Exploited Vulnerabilities Catalog, including Apache Log4Shell Log4j and Fortinet FortiOS issues....
Last week on Malwarebytes Labs: Log4j zero-day “Log4Shell” arrives just in time to ruin your weekendClick “OK” to defeat MFAFake...
FiddleZAP is a simplified version of There are 2 Select the following parameters:It now shows under standalone: Passive RulesNext, install the...
Threat actors are already abusing Log4Shell vulnerability in the Log4j library for malicious purposes such as deploying malware. A few...
Immediately after the disclosure of the Log4Shell flaw in Log4j library threat actors started including the exploit code in Linux...
Quebec shut down nearly 4,000 of its sites in response to the discovery of the Log4Shell flaw in the Apache Log4j Java-based logging...
A United States court has sentenced to four years in prison for the Russian citizen Oleg Koshkin for his role...
Cofense researchers discovered a new phishing campaign using QR codes targeting German e-banking users in the last weeks. Threat actors continue...
CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language that everybody...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Vulnerabilities in the Western Digital SanDisk SecureAccess can be exploited to access user data through brute force and dictionary attacks....
Captfencoder is an extensible CaptfEncoder all functions provided are based on UseMethod always downloads the executablehttps://github.com/guyoung/CaptfEncoder/releasesBaidu network disk https://pan.baidu.com/s/1q2N1w44bvYIXLe5gCI5oKA Password:...
Accenture researchers detailed the activity of a new sophisticated cybercrime group, called Karakurt, behind recent cyberattacks. Accenture researchers detailed the...
AD Enum is a Microsoft Advanced Threat Analytics ATA detects two suspicious events but does not trigger an alert: The...
Cybereason researchers released a “vaccine” that mitigates the critical ‘Log4Shell’ Apache Log4j code execution vulnerability. Chinese security researcher p0rz9 publicly...
Swedish automotive manufacturer Volvo Cars revealed that has suffered a cyberattack that resulted in the theft of R&D data. Swedish...
We want to maintain this as an open-source project to fight against the attacks on our favorite Prerequisites A kubernetes...
The Australian Cyber Security Centre (ACSC) warns of Conti ransomware attacks again multiple Australian organizations. The Australian Cyber Security Centre...
If you’re running a service that relies on Apache Struts or uses the popular Apache Log4j utility we hope you...
Researchers have discovered that Nobelium—the threat actor behind the infamous SolarWinds supply-chain attack, the Sunburst backdoor, TEARDROP malware, GoldMax malware,...