Three flaws allow attackers to bypass UEFI Secure Boot feature
Researchers discovered a flaw in three signed third-party UEFI boot loaders that allow bypass of the UEFI Secure Boot feature....
Researchers discovered a flaw in three signed third-party UEFI boot loaders that allow bypass of the UEFI Secure Boot feature....
The U.S. State Department announced a $10 million reward for information related to five individuals associated with the Conti ransomware gang. The...
In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods and...
Threat actors are exploiting an authentication bypass Zimbra flaw, tracked as CVE-2022-27925, to hack Zimbra Collaboration Suite email servers worldwide. An authentication bypass...
The Conti ransomware gang is using BazarCall phishing attacks as an initial attack vector to access targeted networks. BazarCall attack,...
Palo Alto Networks devices running the PAN-OS are abused to launch reflected amplification denial-of-service (DoS) attacks. Threat actors are exploiting...
Faraday was built from within the security community, to make vulnerability management easier and enhance our work. What IDEs are...
Time for another Kali Linux release! – Kali Linux 2022.3. This release has various impressive updates.The highlights for Kali’s 2022.3’s...
A former Twitter employee was found guilty of spying on certain Twitter users for Saudi Arabia. A former Twitter employee,...
Cisco addressed a high severity flaw, tracked as CVE-2022-20866, affecting Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software....
Cisco discloses a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole internal data....
70% of Large enterprises that previously addressed the Log4j flaw are still struggling to patch Log4j-vulnerable assets. INTRODUCTION In December...
10 packages have been removed from the Python Package Index (PyPI) because they were found harvesting data. Check Point researchers...
Cloudflare revealed that at least 76 employees and their family members were targeted by smishing attacks similar to the one...
PyConUS'22 talk and slides. BlackHAT Asia'22 Arsenal presentation PackagingCon'21 talk and slides Academic dissertation on open-source software security and the...
US Critical Infrastructure Security Agency (CISA) adds vulnerabilities in the UnRAR utility to its Known Exploited Vulnerabilities Catalog. The Cybersecurity...
VMware warns of the availability of a proof-of-concept exploit code for a critical authentication bypass flaw in multiple products. VMware...
Microsoft Patch Tuesday security updates for August 2022 addressed a zero-day attack remote code execution vulnerability in Windows. Microsoft Patch...
Cybersecurity researchers from Kaspersky linked the Maui ransomware to the North Korea-backed Andariel APT group. Kaspersky linked with medium confidence...
China-linked threat actors targeted dozens of industrial enterprises and public institutions in Afghanistan and Europe. In January 2022, researchers at...
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution. It works by...
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned the crypto mixer service Tornado Cash used by North...
Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022....
Experts spotted a new botnet named Orchard using Bitcoin creator Satoshi Nakamoto’s account information to generate malicious domains. 360 Netlab...