UK Security Agency Publishes New Crypto Designs
The UK’s National Cyber Security Centre (NCSC) looked to burnish its tech credentials this week with the publication of new...
The UK’s National Cyber Security Centre (NCSC) looked to burnish its tech credentials this week with the publication of new...
The US Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Football League (NFL), Allegiant Stadium and Super Bowl...
The year 2023 has seen a surge of over 700 advertisements on the dark web offering Distributed Denial of Service...
Security researchers at SentinelLabs, in collaboration with QGroup, have unveiled a new threat actor known as Sandman. This unidentified group...
Will the “hot zero-day summer” we’ve been experiencing in 2023 become the new normal?With 62 zero-day vulnerabilities exploited since January,...
The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back to 2020 that led to its...
A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access to compromised organizations...
Security teams are familiar with threats emanating from third-party applications that employees add to improve their productivity. These apps are...
China's Ministry of State Security (MSS) has accused the U.S. of breaking into Huawei's servers, stealing critical data, and implanting...
A previously undocumented threat actor dubbed Sandman has been attributed to a set of cyber attacks targeting telecommunic koation providers...
The peer-to-peer (P2) worm known as P2PInfect has witnessed a surge in activity since late August 2023, witnessing a 600x...
Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could be exploited to...
An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok, particularly users...
Apple has released yet another round of security patches to address three actively exploited zero-day flaws impacting iOS, iPadOS, macOS,...
Thorough, independent tests are a vital resource for analyzing provider's capabilities to guard against increasingly sophisticated threats to their organization....
Israeli organizations were targeted as part of two different campaigns orchestrated by the Iranian nation-state actor known as OilRig in...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infowibu -- codemeter_runtime A heap buffer overflow vulnerability in Wibu CodeMeter Runtime...
dynmx (spoken dynamics) is a signature-based detection approach for behavioural malware features based on Windows API call sequences. In a...
Company Name: b'Nord Security' Company HackerOne URL: https://hackerone.com/nordsecurity Submitted By:b'yozzo_'Link to Submitters Profile:https://hackerone.com/b'yozzo_' Report Title:b'Email verification bypass for manual connection...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...