Reading INTERPOL the African Cyberthreat Assessment Report 2021
INTERPOL published the African Cyberthreat Assessment Report 2021, a report that analyzes evolution of cybercrime in Africa. A new report...
INTERPOL published the African Cyberthreat Assessment Report 2021, a report that analyzes evolution of cybercrime in Africa. A new report...
MITRE and CISA announced the release of the “2021 Common Weakness Enumeration (CWE) Most Important Hardware Weaknesses” list. MITRE and...
An alleged member of the TrickBot gang, the Russian national Vladimir Dunaev (aka FFX), has been extradited to the US....
GC2 (Google Command and Control) is a Command and Control application that allows an attacker to execute commands on the...
The Hive ransomware operators have developed a new variant of their malware that can encrypt Linux and FreeBSD. ESET researchers...
A ransomware attack hit Papua New Guinea ‘s finance ministry and disrupted government payments and operations. Government officials confirmed that...
This tool can Installation- git clone https://github.com/HightechSec/scarce-apache2- cd scarce-apache2- bash scarce.shor you can install in your system like this- git...
Europol and Norwegian Police arrested 12 individuals over ransomware attacks on organizations worldwide, including critical infrastructure operators. A joint operation...
The US NSA and CISA published a security advisory to warn about threat actors compromising 5G networks via cloud infrastructure....
Use the HTTP protocol version to send a file bit by bit ("HTTP/1.0" is a 0 and "HTTP/1.1" is a...
Microsoft finds a flaw in macOS, dubbed Shrootless (CVE-2021-30892), that can allow attackers to bypass System Integrity Protection (SIP). Microsoft discovered a...
A vulnerability in the popular the OptinMonster plugin allows unauthorized API access and sensitive information disclosure. A high-severity vulnerability (CVE-2021-39341)...
HTTPUploadExfil is a (very) simple HTTP server written in Go that's useful for getting files (and other information) off a...
ESET researchers discovered a previously undescribed loader for Windows binaries, tracked as Wslink, that runs as a server and executes...
AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security...
German authorities have identified a Russian man named Nikolay K. who is suspected to be a prominent member of the...
Dumping revelant information on compromised targets without AV detection DPAPI dumpingLots of credentials are protected by DPAPI. We aim at...
Threat actors have stolen $130 million worth of cryptocurrency assets from the Cream Finance decentralized finance (DeFi) platform. C.R.E.A.M. Finance...
Security firm Avast released today decryptors for AtomSilo and LockFile ransomware that allow victims to recover their files for free....
Grief ransomware operators claim to have compromised computer systems at US National Rifle Association (NRA) and added it to their...
Download Clash If you like the site, please consider joining the telegram channel or supporting us on Patreon using the...
Researchers from cybersecurity firm Avast released a decryption tool for Babuk ransomware that allows victims to recover their files for...
I’m proud to announce the release of the 9th edition of the ENISA Threat Landscape (ETL) on the state of...
Bruteforcing on Hidden parameters to find SSRF vulnerability using GET and POST MethodsNOTELorsrf has been added to scant3r with useful...