Foreign APT groups use coronavirus phishing lures to drop RAT malware
Each day, as the novel coronavirus multiplies and spreads, so do cyber scams capitalizing on users’ fears and thirst for...
Each day, as the novel coronavirus multiplies and spreads, so do cyber scams capitalizing on users’ fears and thirst for...
Members of the IT and cybersecurity communities have successfully obtained a password key for victims of CovidLock Android ransomware, which...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the...
Since the coronavirus became a worldwide health issue, the desire for more information and guidance from government and health authorities...
After the World Health Organization (WHO) officially recognized the outbreak of COVID-2019 as a pandemic, many employers offered their employees...
The whole world is in high alert with coronavirus COVID-19, as being declared a pandemic and every government is making...
The other day, our Android traps ensnared an interesting specimen of stalkerware — commercial software that is usually used to...
Word list generator to crack security tokens.Example use case You are testing reset password function Reset password token was sent...
shuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as...
Recently, we interviewed Anthony Edwards, director of security operations for Hilltop Holdings, about how his financial holdings organization approaches multi-level...
COVID-19 has created a great deal of concern and uncertainty, and we want to reassure our customers that your security...
We have rapidly entered a new era of living with a global pandemic. As a result, many are working from...
As per discoveries of competent security software two new Android malware is on the hunt to 'discreetly' access control of...
Google has awarded 100,000 dollars prize to a Dutch researcher Wouter ter Maat for the Google Cloud Platform (GCP), for...
AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names.Download AWSGen.py Original Source
Jeopardize tool is developed to provide basic threat intelligence&response capabilities against phishing domains at the minimum cost as possible. It...
The well-known Tor is allegedly experiencing some kind of bug in its mechanism. It has hence warned the users to...
A ssh-client worm made with tas framework.How it works?This is a fakessh-client that manipulates the tty input/output to execute arbitrary...
Zelos (Zeropoint Emulated Lightweight Operating System) is a python-based binary emulation platform. One use of zelos is to quickly assess...
The recently discovered weaponized coronavirus map found to infect victims with a variant of the information-stealing AZORult malware has been...
A malicious Android app that supposedly helps track cases of the coronavirus actually locks users’ phones and demands a ransom...
Outside the coronavirus pandemic and its related healthcare and economic fallout, climate change and cybersecurity are seen by many as...
Yekaterina Korotkova, the representative of the Moscow Interregional Transport Prosecutor's Office reported that the Northern Transport Prosecutor’s Office revealed a...
The price of cryptocurrency Bitcoin tumbled drastically, losing 20 percent of its value within an hour. The value of Bitcoin...