Experts investigate WhatsApp data leak: 500M user records for sale
Cybernews investigated a data sample available for sale containing up-to-date mobile phone numbers of nearly 500 million WhatsApp users. Original...
Cybernews investigated a data sample available for sale containing up-to-date mobile phone numbers of nearly 500 million WhatsApp users. Original...
SharpSCCM is a post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager (a.k.a. ConfigMgr, formerly SCCM) for lateral movement and...
An international law enforcement operation has dismantled an online phone number spoofing service called iSpoof. An international law enforcement operation that...
The British government banned the installation of Chinese-linked security cameras at sensitive facilities due to security risks. Reuters reports that...
RansomExx ransomware is the last ransomware in order of time to have a version totally written in the Rust programming...
Octopii is an open-source AI-powered Personal Identifiable Information (PII) scanner that can look for image assets such as Government IDs,...
Researchers warn of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. Experts...
Microsoft reported that hackers have exploited flaws in a now-discontinued web server called Boa in attacks against critical industries. Microsoft experts...
Pro-Russian hacker collective Killnet took down the European Parliament website with a DDoS cyberattack. The Pro-Russia group of hacktivists Killnet...
The operators behind the Ducktail information stealer continue to improve their malicious code, operators experts warn. In late July 2022,...
Researchers discovered that analytics data associated with iPhone include Directory Services Identifier (DSID) that could allow identifying users. Researchers at...
pronounced "screen copy"Read in another languageThis application provides display and control of Android devices connected via USB or over TCP/IP....
Microsoft released an out-of-band update to fix problems tied to a recent Windows security patch that caused Kerberos authentication issues....
The gang behind Quantum Locker used a particular modus operandi to target large enterprises relying on cloud services in the...
Let’s give a look at API vulnerabilities by reading the API Security Top 10 published by the Open Web Application...
A researcher revealed how to bypass some of the filters in Cisco Secure Email Gateway appliance and deliver malware using...
Researchers warn of threat actors employing a new Go-based malware dubbed Aurora Stealer in attacks in the wild. Aurora Stealer...
Over the last 10 years, many threat groups have employed stegomalware or other steganography-based techniques to attack organizations from all...
Two Estonian citizens were arrested in Tallinn for allegedly running a $575 million cryptocurrency fraud scheme. Two Estonian nationals were...
The Emotet malware is back and experts warn of a high-volume malspam campaign delivering payloads like IcedID and Bumblebee. Proofpoint...
A researcher published details and proof-of-concept (PoC) code for High-Severity macOS Sandbox escape vulnerability tracked as CVE-2022-26696. Researcher Wojciech Reguła...
Google won a lawsuit filed against two Russian nationals involved in the operations of the Glupteba botnet. This week, Google...
The Sandbox Scryer is an open-source tool for producing threat hunting and intelligence data from public sandbox detonation output The...
Researchers at Google Cloud identified 34 different hacked release versions of the Cobalt Strike tool in the wild. Cobalt Strike...