The head of Microsoft announced evidence of the involvement of Russian intelligence in the cyber attack
Approximately 100 US companies and nine government agencies were affected by the hack using Orion software of SolarWinds, which is...
Approximately 100 US companies and nine government agencies were affected by the hack using Orion software of SolarWinds, which is...
French authorities unearthed a glut of stolen credentials on the dark web, apparently belonging to the healthcare workers. The authorities...
Mozilla's latest Firefox 86 has been rolled -out for desktop, Mac, Windows, and Linux platforms. The browser upgrade brings features...
Lazarus targets defense industry with ThreatNeedle (PDF) We named Lazarus the most active group of 2020. We’ve observed numerous activities...
If you want to learn more about the techniques utlized in this framework please take a look at Part 1...
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements...
Time for another Kali Linux release! – Kali Linux 2021.1. This release has various impressive updates. The summary of the changelog...
Building security into your overall vulnerability risk management (VRM) strategy is a must-do in the age of the all-important web...
What’s up?On Feb. 24, 2021, Cisco released many patches for multiple products, three of which require immediate attention by organizations...
Google Project Zero team disclosed the details of a recently patched remote code execution vulnerability (CVE-2021-24093) in Windows Operating system....
A Chinese security researcher published a PoC code for the CVE-2021-21972 vulnerability in VMware Center, thousands of vulnerable servers are exposed online....
Ukraine ‘s government attributes a cyberattack on the government document management system to a Russia-linked APT group. The Ukraine ‘s...
Crooks are exploiting BTC blockchain transactions to hide backup command-and-control (C2) server addresses for a cryptomining botnet. Security experts from...
Malwarebytes’ Threat Intelligence analysts are continually researching and monitoring active malware campaigns and actor groups as the prevalence and sophistication...
Security experts from Akamai have detected another botnet utilized for illegal cryptocurrency mining exercises that are abusing Bitcoin (BTC) transactions...
As noted by experts, information leakage in large companies does not often happen, but data theft can occur through contractorsScammers...
Bitcoin, the world’s largest cryptocurrency slumped as much as 17 percent to $45,000 on Tuesday, sparking concerns from investors over...
Ukraine on Monday alleged major attacks against the Ukrainian security and defense website by unidentified Russian Internet networks but did...
Researchers reported on Tuesday that they discovered two email phishing assaults targeting at least 10,000 mailboxes at FedEx and DHL...
BlackMamba is a multi client C2/post exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework. Some...
A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use. Low on resources, high on information...
This blog post was co-authored by Bob Rudis and Caitlin Condon. What’s up?On Feb. 23, 2021, VMware published an advisory...
Do you know about CVE-2013-4866? No? It details a hardcoded PIN in a Smart Bidet giving attackers access to the...
Vietnam-linked APT32 group targeted Vietnamese human rights defenders (HRDs) between February 2018 and November 2020. Vietnam-linked APT32 (aka Ocean Lotus)...