FBI face recognition trawl finds Capitol rioter via his girlfriend’s Instagram
Facial recognition tech is in the news again after the FBI discovered the identify of one of the Capitol rioters...
Facial recognition tech is in the news again after the FBI discovered the identify of one of the Capitol rioters...
Pulse Secure has alerted customers to the existence of an exploitable chain of attack against its Pulse Connect Secure (PCS)...
Microsoft quietly patched a local privilege escalation (LPE) flaw that affects both Windows 7 and Server 2008 R2 computers. This...
Cybercriminals with apparent ties to North Korea that hit e-commerce shops in 2019 and 2020 to steal payment card data...
The Swedish Prosecutor's Office and the Swedish State Security Service accused Russia's Main Intelligence Directorate of a hacking attack on...
The Serious Organized Crime Threat Assessment study 2021 by Europol summarises the criminal threat from the last four years and...
According to a local security firm, a Chrome exploit published online last week has been weaponized and exploited to target...
If you have read our previous blogpost “Targeted Malware Reverse Engineering Workshop follow-up. Part 1“, you probably know about the...
dnspeep lets you spy on the DNS queries your computer is making. Here's some example output: $ sudo dnspeepquery name...
Overlord provides a python-based console CLI which is used to build Red Teaming infrastructure in an automated way. The user...
The REvil ransomware operators are attempting to blackmail Apple after they has allegedly stolen product blueprints of the IT giant...
Security vendor SonicWall has addressed three zero-day vulnerabilities affecting both its on-premises and hosted Email Security products. SonicWall is warning its customers...
At least one China-linked APT group exploited a new zero-day flaw in Pulse Secure VPN equipment to break into the...
The popular cyber security expert Luca Bongiorni demonstrated how to hack an X-Ray Machine using his WHIDelite tool. Recently I...
Researchers from security firm Group-IB have detected a large-scale scam campaign targeting Facebook Messenger users all over the world. Group-IB...
In 2018 three high-ranking members of a sophisticated international cybercrime group operating out of Eastern Europe were arrested and taken...
CodeCov, a company that creates software auditing tools for developers, was recently breached (the company says it was breached on...
Behind the scenes there are many people working in cyber-security that make the internet a safer place. Youssef Sammouda is...
Attackers are promoting sites that imitate the Microsoft Store, Spotify, and an online document converter to spread malware that steals...
Russian cyber security company Positive Technologies rejected the accusations of interference in the American elections, made by the U.S. Treasury...
WhatsApp on Monday stated that it has addressed two bugs that existed on its outdated software program and that it...
Since the beginning of the year, there has been a slew of third-party cybersecurity attacks, with the repercussions affecting a...
A hacker seems to sell confidential information that is claimed to have been robbed from an OTP firm. And this...
A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs. cause Xencrypt is not...