Russia’s second-largest bank VTB Bank under DDoS attack
Russia’s second-largest bank VTB Bank reveals it is facing the largest DDoS (distributed denial of service) attack in its history....
Russia’s second-largest bank VTB Bank reveals it is facing the largest DDoS (distributed denial of service) attack in its history....
Researchers discovered a security flaw in the connected vehicle service SiriusXM that exposes multiple car models to remote attacks. Cybersecurity...
The Klyda project has been created to aid in quick credential based attacks against online web applications. Klyda supports the...
Researchers spotted a version of the open-source ransomware toolkit Cryptonite that doesn’t support decryption capabilities. Fortinet researchers discovered a sample of...
Nicholas Truglia, from Florida, US, was sentenced to 18 months in prison for stealing more than $20 million in a...
A French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the weekend....
Resecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers and operators. “In the Box” dark...
scscanner is tool to read To do List Add multi-processing Add filter status code options Add save to file options...
A critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD systems. The maintainers...
The North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the AppleJeus malware. Volexity...
Law enforcement agencies can extract data from the infotainment systems of thousands of different car models. Data managed by infotainment...
US DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit multiple high-profile companies....
Neton is a tool for getting information from Internet connected sandboxes. It is composed by an agent and a web...
Experts spotted a new data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices and courts. Researchers...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Google released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in the wild. Google...
A script for generating common revshells fast and easy. Especially nice when in need of Youtube video Version 1.4.6 Added...
Qualys researchers demonstrated how to chain a new Linux flaw with two other two issues to gain full root privileges...
Threat actors could exploit drones for payload delivery, kinetic operations, and even diversion, experts warn. Original post at https://cybernews.com/security/drones-hack-airborne-cybersecurity-nightmare/ Once...
Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of...
Experts found multiple flaws in three Android Keyboard apps that can be exploited by remote attackers to compromise a mobile...
With this application, it is aimed to accelerate the incident response processes by collecting information in windows operating systems via...
Redigo is a new Go-based malware employed in attacks against Redis servers affected by the CVE-2022-0543 vulnerability. Researchers from security firm...
Data breaches can be devastating for organizations, these are 3 of the worst incidents that could have been prevented Data...