Security Affairs newsletter Round 346
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Apple recently addressed fixed a flaw in the macOS that could be potentially exploited by an attacker to bypass Gatekeeper...
Feature-rich Onion Service manager for UNIX-like operating systems written in POSIX conformant shellscriptA collection of EchosystemOnion Services are the Hidden...
Threat actors attempted to take advantage of the interest in the new ‘ Spider-Man: No Way Home’ movie to spread...
Playing around with the 2. Query created process to extract its base address pointer from PEB (Process Environment Block).3. Read...
Recently launched ransomware operation, named Rook, made headlines for its announcement claiming a desperate need a lot of money. A...
A gang behind a recent Dridex Omicron campaign is moking the victims taunting them with a COVID-19 funeral assistance helpline...
Spam Scanner is the best anti-spam, email filtering, and phishing prevention service. Spam Scanner is a drop-in replacement and the...
Spray365 is a password spraying tool that identifies valid credentials for Spraying Getting StartedInstallationClone the repository, install the required Python...
Experts found serious privacy issues affecting Fisher Price Chatter Bluetooth Telephone, a Bluetooth headset that appears like a classic kids...
A script for automatize boolean-based blind SQL injections. Works with Note: please, use it only for your own servers or...
Security researchers spotted a campaign that is employing a new stealthy malware tracked as BLISTER that targets windows systems. Elastic...
NVIDIA released a security advisory to inform customers what products are affected by the recently disclosed Log4Shell vulnerability. NVIDIA has...
First of all - credit to CreateProcessAsUserW with SpoolSample trigger:c:tempMultiPotato> MultiPotato.exe -t CreateProcessAsUserW -p "pwnedpipespoolss" -e "C:tempstage2.exe"And trigger it viac:tempMultiPotato>MS-RPRN.exe...
In a recent wave of attacks, AvosLocker ransomware is rebooting systems into Windows Safe Mode to disable endpoint security solutions....
Crooks discovered how to bypass the patch for a recent Microsoft Office vulnerability (CVE-2021-40444) and are using it to distribute...
Researchers disclosed four vulnerabilities in the Teams business communication software, but Microsoft will not address three of them. Researchers from...
TrojanSourceFinder helps developers detect "Trojan Source" Homoglyph AlternativeAs mentioned by @ioah86 here, trojan source could also been detected w/ a one...
The DHS has announced that it is expanding the ‘Hack DHS’ bug bounty program to report for Log4J impacting its...
A vulnerability in the Microsoft Azure App Service led to the exposure of customer source code for at least four years....
US CISA release of a scanner for identifying web services affected by two Apache Log4j remote code execution vulnerabilities. The...
IoT This project provides IoT malware similarity analysis based on shared codes. It helps to identify other malwares that have...
Video game company Ubisoft confirmed a security breach that resulted in unauthorized access to ‘Just Dance’ user data. Ubisoft discloses...
PYSA and Lockbit were the most active ransomware gangs in the threat landscape in November 2021, researchers from NCC Group...