LockBit 2.0 Ransomware Victim: mcmanislaw[.]com
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
A new threat actor is exploiting ProxyShell flaws in attacks aimed at Microsoft Exchange servers to deploy the Babuk Ransomware...
PyRDP is a Python Supported SystemsPyRDP should work on Python 3.6 and up on the x86-64, ARM and ARM64 platforms....
Two popular npm libraries, coa and rc., have been hijacked, threat actors replaced them with versions laced with password-stealing malware. The security...
The US government offers up to a $10,000,000 reward for information leading to the identification or arrest of DarkSide gang...
CISA urges vendors to address BrakTooth flaws after researchers have released public exploit code and a proof of concept tool...
The Cybersecurity and Infrastructure Security Agency (CISA) has issued binding directive 22-01 titled Reducing the Significant Risk of Known Exploited...
Cisco fixed critical flaws that could have allowed unauthenticated attackers to access its devices with hard-coded credentials or default SSH...
androidqf (Android Quick Forensics) is a portable tool to simplify the acquisition of relevant forensic data from Android devices. It...
A critical heap-overflow vulnerability, tracked as CVE-2021-43267, in Linux Kernel can allow remote attackers to takeover vulnerable installs. A SentinelOne...
The US DoJ charged the suspected Twitter hacker ‘PlugWalkJoe’ with the theft of $784,000 worth of cryptocurrency using SIM swap attacks....
The US CISA shared a list of vulnerabilities known to be exploited in the wild and orders US federal agencies...
Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! With this tool you can...
CERT-France warns of a new ransomware group named Lockean that is behind a series of attacks against French organizations over...
The U.K. Labour Party discloses a data breach after a ransomware attack hit a service provider that is managing its...
Haron Ransomware Blog Logo NOTE: The information on this page is fully automated and scraped directly from the Haron .onion...
Haron Ransomware Blog Logo NOTE: The information on this page is fully automated and scraped directly from the Haron .onion...
Haron Ransomware Blog Logo NOTE: The information on this page is fully automated and scraped directly from the Haron .onion...
Haron Ransomware Blog Logo NOTE: The information on this page is fully automated and scraped directly from the Haron .onion...