A fake job offer via LinkedIn allowed to steal $540M from Axie Infinity
Threat actors used a fake job offer on LinkedIn to target an employee at Axie Infinity that resulted in the theft...
Threat actors used a fake job offer on LinkedIn to target an employee at Axie Infinity that resulted in the theft...
A modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors, user enumeration and more....
A large-scale phishing campaign leveraging the Anubis Network is targeting Brazil and Portugal since March 2022. A large-scale phishing campaign...
BlackCat (aka ALPHV) Ransomware gang introduced an advanced search by stolen victim’s passwords, and confidential documents. The notorious cybercriminal syndicate...
BleepingComputer reported a new ransomware operation named 0mega that is targeting organizations worldwide. 0mega is a new ransomware operation that...
SecretFlow is a unified framework for privacy-preserving data intelligence and machine learning. To achieve this goal, it provides: An abstract...
Bad news for the owners of several Honda models, the Rolling-PWN Attack vulnerability can allow unlocking their vehicles. A team...
French virtual mobile telephone operator La Poste Mobile was hit by a ransomware attack that impacted administrative and management services. ...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
Apple plans to introduce a security feature, called Lockdown Mode, to protect its users against “highly targeted cyberattacks.” The recent wave of...
Fortinet released security patches to address multiple High-Severity vulnerabilities in several products of the vendor. Fortinet addressed multiple vulnerabilities in...
Threat actors are exploiting the disclosed Follina Windows vulnerability to distribute the previously undocumented Rozena backdoor. Fortinet FortiGuard Labs researchers...
pamspy leverage eBPF technologies to achieve an equivalent work of 3snake. It will track a particular userland function inside the...
Cybereason researchers are warning of a wave of attacks spreading the wormable Windows malware Raspberry Robin. Raspberry Robin is a Windows...
Experts documented the evolution of the LockBit ransomware that leverages multiple techniques to infect targets and evade detection. The Cybereason Global...
Cisco fixed a critical vulnerability in the Cisco Expressway series and TelePresence Video Communication Server (VCS) products. Cisco released security...
Emsisoft has released a free decryption tool that allows victims of the AstraLocker and Yashma ransomware to recover their files...
Untethered + Unsandboxed code execution haxx as root on iOS 14 - iOS 14.8.1. Based on CoreTrustDemo, also please note...
This is a transcription of my complete interview with the program NEWSFEED at TRT, during which we discussed NGL software...
The operators behind the TrickBot malware are systematically targeting Ukraine since the beginning of the war in February 2022. IBM...
Taiwanese vendor QNAP wars of a new strain of ransomware, dubbed Checkmate, that is targeting its NAS devices. The Taiwanese...
Researchers uncovered a large-scale cryptocurrency mining campaign targeting the NPM JavaScript package repository. Checkmarx researchers spotted a new large-scale cryptocurrency...
US authorities have issued a joint advisory warning of North Korea-linked APTs using Maui ransomware in attacks against the Healthcare...
I’m proud to announce that the European Union Agency for Cybersecurity, ENISA, has released the Threat Landscape Methodology. Policy makers,...