Russia’s disinformation uses deepfake video of Zelenskyy telling people to lay down arms
Russian disinformation continues, this time it used a deepfake video of Zelenskyy inviting Ukrainians to ‘lay down arms.’ A deepfake...
Russian disinformation continues, this time it used a deepfake video of Zelenskyy inviting Ukrainians to ‘lay down arms.’ A deepfake...
The US Cybersecurity and Infrastructure Security Agency (CISA) added 15 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S....
Introduction RefleXXion is a utility designed to aid in How to Use You can open and compile the project with...
FBI and CISA warn Russia-linked threats actors gained access to an NGO cloud after enrolling their own device in the...
WMEye is an experimental tool that was developed when exploring about Windows WMI. The tool is developed for performing Lateral...
In mere seconds, a hacker remotely accessed a computer belonging to a regional Russian Ministry of Health, taking advantage of...
Patching A complete listing of the contextual patching actions are described in the following sections. Assemble The main patching dialog...
OpenSSL addressed a high-severity denial-of-service (DoS) vulnerability, tracked as CVE-2022-0778, related to certificate parsing. OpenSSL released updates to address a high-severity...
Veeam addressed two critical vulnerabilities impacting the Backup & Replication product for virtual environments. Veeam has released security patches to...
German Federal Office for Information Security agency, also known as BSI, recommends consumers not to use Kaspersky anti-virus software. The...
Taiwanese vendor QNAP warns most of its NAS devices are impacted by high severity Linux vulnerability dubbed ‘Dirty Pipe.’ Taiwanese...
Experts discovered a new wiper, tracked as CaddyWiper, that was employed in attacks targeting Ukrainian organizations. Experts at ESET Research...
Many Israel government websites were offline after a cyberattack, defense sources claim that this is the largest-ever attack that hit...
Lnkbomb is used for uploading malicious shortcut files to insecure file shares. The Executable Usage Download Lnkbomb from the releases...
Ukraine’s defense ministry began using Clearview AI’s facial recognition technology to uncover Russian assailants, combat misinformation and identify the dead....
Anonymous claims to have hacked the systems of the German subsidiary of Russian energy giant Rosneft and stole 20TB of...
Tencent Cloud Experience Apply Link Key Features Language support: It supports Java/C++/Objective-C/C#/JavaScript/Python/Go/PHP and more, covering common programming languages. Code inspection:...
Brazilian trojan impacting Portuguese users and using the same capabilities seen in other Latin American threats Introduction A new variant...
While the Russia-Ukraine cyber conflict goes on, nation-state actors, crooks, and hacktivists continue to pose critical infrastructure at risk. Critical...
Attackers think in graphs, defenders think in actions, Documentation All documentation can be found in the wiki Acknowledgments The py2neo...
Anonymous has published a new message for Russian citizens inviting them to remove Putin that is sacrificing them and killing...
The hidden C2: Lampion trojan release 212 is on the rise and using a C2 server for two years. Lampion trojan...
This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective....
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...