Malvertising campaign spoofs Malwarebytes website to deliver Raccoon info-stealer
Malicious actors created a fake webpage that impersonates cybersecurity company Malwarebytes and were using it as a gateway in a...
Malicious actors created a fake webpage that impersonates cybersecurity company Malwarebytes and were using it as a gateway in a...
The coronavirus (COVID-19) has become a global pandemic, and this is a golden time for attackers to take advantage of...
Group-IB specialists identified the spread of a popular scam on the Network. The Double Deception scheme is as follows: people...
The latest report published by Meno Security indicates that 52% of the top one million websites have "HTTPS" in their...
Bitcoin, our favorite digital currency has experienced a certain kind of unbelievable hike, all of a sudden. It has profited...
Director of the Department of International Information Security of the Russian Foreign Ministry Andrei Krutskikh said on Tuesday during the...
A reconnaissance tool that analyzes ARP requests to identify hosts that are likely communicating with one another, which is useful...
Richkit is a python3 package that provides tools taking a domain name as input, and returns addtional information on that...
Organizations operating in a cloud environment like Amazon Web Services (AWS) face additional security risk challenges that they need to...
Crisis events such as the current COVID-19 pandemic often lead to a change in habits that captures the attention of...
In tough times like this, there is always someone out there looking for a weak spot to attack their enemy....
Figures of the year The share of spam in mail traffic was 56.51%, which is 4.03 p.p. more than in...
Chromepass is a python-based console application that generates a windows executable with the following features:Decrypt Chrome saved paswordsSend a file...
Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It...
Hey, gang. You know I'm a big open source fan and occasional contributor, so I just wanted to take a...
On this week’s episode of Security Nation, we had the pleasure of speaking with John Strand, CEO of BlackHills Information...
While exploit kit activity has been fairly quiet for some time now, we recently discovered a threat actor creating a...
The Internet of Things (IoT) is a term used to describe a wide variety of devices that are connected to...
First Deputy Chairman of the Bank of Russia Olga Skorobogatova said that blockchain is perfect for letters of credit and...
There is no denying the fact that whenever the word ransomware is mentioned computers are an instinctive afterthought to have...
It was the middle of last year that we detected the start of mass attacks by the xHelper Trojan on...
The Tails team is happy to publish Tails 4.5, the first version of Tails to support Secure Boot.This release also fixes...
A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA...
A batch-catching, pattern-matching, patch-attacking secret snatcher.GitHound pinpoints exposed API keys and other sensitive information on GitHub using pattern matching, commit...