Suspects Linked to the Clop Ransomware Gang Detained in Ukraine
Following a joint operation by law enforcement agencies from Ukraine, South Korea, and the United States, multiple persons alleged to...
Following a joint operation by law enforcement agencies from Ukraine, South Korea, and the United States, multiple persons alleged to...
America's largest propane supplier, AmeriGas, has revealed a data breach that lasted ‘8-second’ but affected 123 employees and one US...
Researchers claim to have uncovered the origins of Hades ransomware's operators, as well as the unique tactics, methods, and procedures...
Japanese conglomerate Fujifilm, earlier this month on Wednesday 2nd June published a short statement to reveal the illegitimate infiltration of...
Ferocious Kitten is an APT group that since at least 2015 has been targeting Persian-speaking individuals who appear to be...
aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely. The current version...
Gundog provides you with guided hunting in Microsoft 365 Defender. Especially (if not only) for Email and Endpoint Alerts at...
A flaw in the Peloton Bike+ could be exploited by an attacker with initial physical access to gain root entry...
A new variant of the Mirai botnet, tracked as Moobot, was spotted scanning the Internet for vulnerable Tenda routers. Researchers...
Japanese multinational conglomerate Fujifilm announced that it has restored operations following the recent ransomware attack. On June 4, the Japanese...
The source code for the Paradise Ransomware has been released on a hacking forum allowing threat actors to develop their...
Microsoft will terminate support for Windows 10 Home and Pro on 14 October 2025, a decade after the original Windows...
Apple has fixed two vulnerabilities in Safari’s WebKit component, announcing it is aware of a report that they may have...
According to the Times of Israel, an Iranian cybercriminal targeted the computer of a former IDF chief of staff and...
Solar JSOC spoke about a series of cyber attacks on Russian government systems in 2020. According to the American Company...
According to new research, the SIP communications protocol can be exploited to conduct cross-site scripting (XSS) assaults. In a blog post...
Researchers at Rapid7 have unearthed three highly critical security flaws in Akkadian Provisioning Manager, a third-party provisioning tool within Cisco...
The epidemic resulted in a 341 percent spike year-over-year in distributed denial of services (DDoS) attacks as per Nexusguard's Annual...
Executive summary In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed...
New technique I have discovered recently and give it a nickname (Chop chop) to perform lateral movement using windows services...
Automated Attack Path Planning and Validation (A2P2V) is a planning and cyber-attack tool that provides the capability for users to...
Reality Winner, a former NSA contractor who leaked classified documents to the press in 2017, has been released from prison...
Instagram has addressed a new flaw that allowed anyone to access private accounts viewing archived posts and stories without having...
The MASQ tool could be used by attackers to emulate device fingerprints thus allowing them to bypass fraud protection controls The...