LockBit 2.0 Ransomware Victim: pro-beam[.]com
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
The US DoJ announced a new Cyber Fellowship program for training prosecutors and attorneys on cybersecurity. The US DoJ announced...
Who is behind the massive and prolonged Distributed Denial of Service (DDoS) attack that hit the Philippine human rights alliance Karapatan?...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an alert urging enterprises to address the recently disclosed vulnerability in...
The Boston Public Library was victim of a cyberattack that crippled its computer network, the library revealed in a statement...
So far, Konni RAT has managed to evade detection as only 3 security solutions on VirusTotal were able to detect...
No one ever wants a group of hackers to say about their company: “We had the keys to the kingdom.”...
Threat actors responsible for the BazaLoader malware designed a brand-new bait to trick website owners into opening malicious files: fake...
The Boston Public Library (BPL) announced on 27th August that its network was compromised on Wednesday, resulting in a system-wide...
The federal police's Computer Crime Unit is looking into an identity fraud case concerning Catherine De Bolle, the executive head...
The Federal Bureau of Investigation (FBI) has issued a security alert regarding the Hive ransomware attacks, which provides technical data...
Read the blog posts here: https://iwantmore.pizza/posts/PEzor.html https://iwantmore.pizza/posts/PEzor2.html https://iwantmore.pizza/posts/PEzor3.html https://iwantmore.pizza/posts/PEzor4.html InstallationThe install.sh is designed to work on a Kali Linux distro....
M.E.A.T. - Mobile Evidence Acquisition ToolkitMeet M.E.A.T! From Jack Farley - BlackStone Discovery This toolkit aims to help forensicators perform...
The name of the sportswear manufacturer Puma appeared on the dark web marketplace of stolen data Marketo, threat actors claim...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The Philippine human rights alliance Karapatan has suffered a massive and prolonged Distributed Denial of Service (DDoS) attack, Qurium organizations linked it...
Taiwan vendor Synology announced that recently disclosed vulnerabilities (CVE-2021-3711 and CVE-2021-3712) in the OpenSSL impact some of its products. Taiwanese company Synology...
vpnMentor’s researchers reported that the Chinese mobile gaming company EskyFun suffered a data breach, over 1 million gamers impacted. vpnMentor’s researchers discovered...
Boffins from the Swiss ETH Zurich university demonstrated PIN bypass attack on contactless cards from Mastercard and Maestro. A group...
Microsoft this week published guidance about three vulnerabilities referred to collectively as ProxyShell days after security researchers at the U.S....
The American multinational technology conglomerate corporation Cisco Systems, based in San Jose, California - has published six security patches for...
F5 Security has patched over a dozen critical-severity vulnerabilities in its BIG-IP networking device, including one which was classified as...
Five new research reports outlining malware detected on compromised Pulse Secure devices were issued this week by the US Cybersecurity...