Experts uncovered novel Malware persistence within VMware ESXi Hypervisors
Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors. Mandiant detailed a novel technique used...
Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors. Mandiant detailed a novel technique used...
Several hacker groups are assisting protestors in Iran using Telegram, Signal and other tools to bypass government censorship. Check Point...
SpyCast is a crossplatform mDNS enumeration tool that can work either in active mode by recursively querying services, or in...
The Brute Ratel post-exploitation toolkit has been cracked and now is available in the underground hacking and cybercrime communities. Threat...
A new multifunctional Go-based malware dubbed Chaos is targeting both Windows and Linux systems, experts warn. Researchers from Black Lotus Labs...
psudohash is a password list The script includes a basic character substitution schema. You can add/modify character substitution patterns by...
The recently discovered malware builder Quantum Builder is being used by threat actors to deliver the Agent Tesla RAT. A...
ONLINE DISINFORMATION is one of the defining issues of our time and the influence of fake news has become an...
The Russia-linked APT28 group is using mouse movement in decoy Microsoft PowerPoint documents to distribute malware. The Russia-linked APT28 employed a technique...
What is scan4all: integrated vscan, nuclei, ksubdomain, subfinder, etc., fully automated and intelligent。red team tools Code-level optimization, parameter optimization, and...
The recently born Bl00Dy Ransomware gang has started using the recently leaked LockBit ransomware builder in attacks in the wild....
nuvola is the new open-source cloud security tool to address the privilege escalation in cloud environments. nuvola is the new...
Meta dismantled a network of Facebook and Instagram accounts spreading disinformation across European countries. Meta announced to have taken down...
North Korea-linked Lazarus APT group is targeting macOS Users searching for jobs in the cryptocurrency industry. North Korea-linked Lazarus APT...
Elbit Systems of America, a subsidiary of defense giant Elbit Systems, disclosed a data breach after Black Basta ransomware gang...
WhatsApp has addressed two severe Remote Code Execution vulnerabilities affecting the mobile version of the software. WhatsApp has published three security...
Unoffical Flipper Zero cli wrapper written in PythonFunctions and characteristics: Flipper serial CLI wrapper Websocket client interfaceSetup instructions:$ git clone...
The recently discovered Erbium information-stealer is being distributed as fake cracks and cheats for popular video games. Threat actors behind...
Researchers are tracking multiple self-proclaimed hacktivist groups working in support of Russia, and identified 3 groups linked to the GRU....
The Ukrainian military intelligence warns that Russia is planning to escalate cyberattacks targeting Ukraine and Western allies. The Main Directorate...
China-linked cyberespionage group TA413 exploits employ a never-before-undetected backdoor called LOWZERO in attacks aimed at Tibetan entities. A China-linked cyberespionage group, tracked...
This project is a C# tool to use Pass-the-Hash for authentication on a local Named Pipe for user Impersonation. You...
A previously undetected hacking group, tracked as Metador, has been targeting telecommunications, internet services providers (ISPs), and universities for about...
Ransomware operators switch to new extortion tactics by using the Exmatter malware and adding new data corruption functionality. The data...