Nobelium APT targets French orgs, French ANSSI agency warns
The French cyber-security agency ANSSI said that the Russia-linked Nobelium APT group has been targeting French organizations since February 2021....
The French cyber-security agency ANSSI said that the Russia-linked Nobelium APT group has been targeting French organizations since February 2021....
STEWS is a tool suite for security testing of WebSockets This research was first presented at OWASP Global AppSec US...
A cyber attack hit the international supermarket franchise SPAR forcing 330 shops in North East England to shut down. A...
A ransomware attack hit an electric utility in Colorado causing a significant disruption and damage. The Delta-Montrose Electric Association (DMEA)...
Threat actors stole more than $150 million in various cryptocurrencies from the cryptocurrency trading platform BitMart. Cryptocurrency trading platform BitMart...
Toutatis is a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more...
Hackers are targeting printers of businesses around the world to print ‘anti-work’ slogans pushing workers to demand better pay. Multiple...
Experts spotted a series of malvertising campaigns using fake installers of popular apps and games to deliver a backdoor and...
Bypass 4xx HTTP response status codes. Based on PycURL. Script uses multithreading, and is based on brute forcing so might...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Researchers discovered a total of 226 potential security vulnerabilities in nine Wi-Fi popular routers from known manufacturers. Security researchers and...
Tool that automates cracking of WPA-2 Wi-Fi credentials using client-server architecture Requirements Airstrike uses Hashcat Brain Architecture, aircrack-ng suite, entr...
German BSI warns of ransomware attacks over the Christmas and end-of-year holidays, fearing Emotet return and attacks on Microsoft Exchange...
Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground. IAM Vulnerable uses the Terraform binary...
The FBI has revealed that the Cuba ransomware gang breached the networks of at least 49 US critical infrastructure organizations....
This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification. Generate Header from CSV...
CISA has released six advisories to warn organizations about security vulnerabilities affecting Hitachi Energy products The U.S. Cybersecurity and Infrastructure...
Apple warns that the mobile devices of at least nine US Department of State employees were compromised with NSO Group ‘s...
IDA2Obj is a tool to implement SBI (Static Binary Instrumentation). The working flow is simple: Dump object files (COFF) directly...
Since 2017, an unknown threat actor has run thousands of malicious Tor relay servers in the attempt to unmask Tor...
Threat actors stole $120 million in cryptocurrencies from multiple wallets connected to the decentralized finance platform BadgerDAO. Threat actors this...
ClusterFuzzLite is a continuous fuzzing solution that runs as part of Continuous Integration (CI) workflows to find vulnerabilities faster than...
Threat actors have started to exploit the interest in the Omicron COVID-19 variant and are using it as a lure...
U.S. CISA urges to address vulnerabilities Qualcomm, Mikrotik, Zoho and the Apache Software Foundation software. U.S. Cybersecurity and Infrastructure Security...