MITRE and CISA publish the 2021 list of most common hardware weaknesses
MITRE and CISA announced the release of the “2021 Common Weakness Enumeration (CWE) Most Important Hardware Weaknesses” list. MITRE and...
MITRE and CISA announced the release of the “2021 Common Weakness Enumeration (CWE) Most Important Hardware Weaknesses” list. MITRE and...
An alleged member of the TrickBot gang, the Russian national Vladimir Dunaev (aka FFX), has been extradited to the US....
GC2 (Google Command and Control) is a Command and Control application that allows an attacker to execute commands on the...
The Hive ransomware operators have developed a new variant of their malware that can encrypt Linux and FreeBSD. ESET researchers...
A ransomware attack hit Papua New Guinea ‘s finance ministry and disrupted government payments and operations. Government officials confirmed that...
This tool can Installation- git clone https://github.com/HightechSec/scarce-apache2- cd scarce-apache2- bash scarce.shor you can install in your system like this- git...
Europol and Norwegian Police arrested 12 individuals over ransomware attacks on organizations worldwide, including critical infrastructure operators. A joint operation...
This blog post was authored by Hasherezade Twice in the past (2017, 2018) we published a Capture-The-Flag challenge dedicated to...
WordPress, the incredibly popular content management platform, is currently dealing with a nasty plugin bug which allows redirects. What is...
This post was authored by one of the most active helpers on the Malwarebytes forums who wishes to remain anonymous....
The US NSA and CISA published a security advisory to warn about threat actors compromising 5G networks via cloud infrastructure....
Microsoft researchers have discovered a vulnerability in macOS, dubbed Shrootless, that can allow attackers to bypass System Integrity Protection (SIP)...
Use the HTTP protocol version to send a file bit by bit ("HTTP/1.0" is a 0 and "HTTP/1.1" is a...
This summer Kaspersky experts took part in the Machine Learning Security Evasion Competition (MLSEC) — a series of trials testing...
Microsoft finds a flaw in macOS, dubbed Shrootless (CVE-2021-30892), that can allow attackers to bypass System Integrity Protection (SIP). Microsoft discovered a...
A vulnerability in the popular the OptinMonster plugin allows unauthorized API access and sensitive information disclosure. A high-severity vulnerability (CVE-2021-39341)...
HTTPUploadExfil is a (very) simple HTTP server written in Go that's useful for getting files (and other information) off a...
ESET researchers discovered a previously undescribed loader for Windows binaries, tracked as Wslink, that runs as a server and executes...
AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security...
Ranzy Locker ransomware emerged in late 2020, when the variant began to target victims in the United States. According to a flash alert issued...
German authorities have identified a Russian man named Nikolay K. who is suspected to be a prominent member of the...
Dumping revelant information on compromised targets without AV detection DPAPI dumpingLots of credentials are protected by DPAPI. We aim at...
Unlike traditional malware, which relies on a file being written to a disk, fileless malware is intended to be memory...
Threat actors have stolen $130 million worth of cryptocurrency assets from the Cream Finance decentralized finance (DeFi) platform. C.R.E.A.M. Finance...