Obtaining password hashes of Windows systems with PetitPotam attack
A researcher found a flaw in Windows OS, tracked as PetitPotam, that can be exploited to force remote Windows machines...
A researcher found a flaw in Windows OS, tracked as PetitPotam, that can be exploited to force remote Windows machines...
Estonian hacker Pavel Tsurkan has pleaded guilty in a United States court to the counts of computer fraud and of...
WizCase’s team of ethical hackers, led by Ata Hakçıl, has found a major breach exposing a number of US cities, all...
How businesses can benefit from the adoption of an identity and access management solution. Businesses that use outdated manual processes...
The software provider Kaseya announced to have obtained a universal decryptor for the REvil ransomware. Earlier this month, a massive...
The Threat Report Portugal: Q1 2021 compiles data collected on the malicious campaigns that occurred from April to June, Q2,...
This blog post was authored by Hasherezade In mid-July we responded to an incident that involved an attack on a...
Two months after fully restoring its systems, CNA Financial, the leading US insurance company that was attacked by a group...
The Dutch police announced that they arrested two Dutch citizens, aged 24 and 15, for developing and selling phishing panels....
In June—July, regular exercises on the stability of the Runet were held. This time the possibility of working in conditions...
Several major websites faced outages on Thursday due to a glitch in Akamai Technologies Inc's (AKAM.O) systems, the second widespread...
Two new vulnerabilities, one in Windows and the other in Linux, were discovered on Tuesday, allowing hackers with a presence...
A detailed warning concerning almost 13 malware samples associated with Pulse Secure operated devices has been issued by the Cybersecurity...
Following a breach, user IDs and passwords for the Tokyo Olympic ticket gateway were released on a leak website, a...
In0ri is a defacement detection system utilizing a image-classification convolutional neural network. IntroductionWhen monitoring a website, In0ri will periodically take...
Sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email...
In August 2019, Audio USA suffered a data breach after a vendor left data unsecured and exposed on the internet....
Doxing (or doxxing) is in the news again, for an absolutely shocking story that ended with a man’s death caused...
A very serious security flaw in immensely popular printer drivers has been disclosed and it could affect many millions of...
On July 18, a group of 17 newspaper and media organizations—aided by Amnesty International’s Security Lab and the research group...
A citizen of Sweden was sentenced to 15 years in prison for manipulating a cryptocurrency scam claiming to pay investors...
On Saturday 10th of July, just after a cyber interruption in IRNA's computing devices, the official IRNA media outlet announced...
Smartphones, unlike PCs, involve a range of radios – generally cellular, Wi-Fi, Bluetooth, and Near Field Communication (NFC) – that...
The case of the infamous spyware Pegasus has taken the world by storm, with news revealing its unlawful use infringing...