Personal data of 1.3 million Clubhouse users leaked online
An SQL database containing the personal data of 1.3 million Clubhouse users was leaked online for free, a few days...
An SQL database containing the personal data of 1.3 million Clubhouse users was leaked online for free, a few days...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
More than 500,000 Huawei users have been infected with the Joker malware after downloading apps from the company’s official Android...
APKPure, one of the largest alternative app stores, was the victim of a supply chain attack, threat actors compromised client...
A few famous online collaboration tools, including the likes of Slack and Discord, are being hijacked by hackers to disperse...
DeviceLock, a company engaged in the fight against data leaks, warned of the preparation of an attack on the accounts...
Zoom security issues were lately troubling users worldwide, very often so. The Zoom video conferencing app was not in the...
Google Chrome has blocked HTTPS, FTP, and HTTP access to TCP (transmission control protocol) port 10080 to protect ports getting...
For the third time in the past six years, cybercriminals have targeted CareFirst BlueCross BlueShield Community Health Plan District of...
An open-source Go project to test different web application firewalls (WAF) for detection logic and bypasses.How it worksIt is a...
Microsoft researchers spotted a malware campaign abusing contact forms on legitimate websites to deliver the IcedID malware. Security experts from...
The FBI arrested a man for allegedly planning a bomb attack against Amazon Web Services (AWS) to kill about 70%...
Zero-day broker Zerodium announced that will triples payouts for remote code execution exploits for the popular WordPress content management system....
Cisco announced it will not release security updates to address a critical security vulnerability affecting some of its Small Business...
Last month, Google began a test pilot of its Federated Learning of Cohorts—or FLoC—program, which the company has advertised as...
In traditional software development, programmers code an application in one computing environment before deploying it to a similar, but often...
Researchers at Analyst1 have noticed that the Maze/Egregor ransomware cartel has made at least $75 million in ransom payments to...
A 46-year-old Missouri man has been sentenced to 12 years without parole in US federal prison today for trying to...
Visa, a global payment processor has warned that hackers are on the rise in deploying web shells in infected servers...
The North Korean-backed Lazarus hacking group employed a new backdoor in targeted attacks against a South African freight and logistics...
As per the information provided by the website ‘Have I Been Pwned’, Carding Mafia, a credit card stealing and trading...
Recently, we’ve found malicious code in version 3.17.18 of the official client of the APKPure app store. The app is...
Command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters...
Redcloud is a powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud's...