NSA`s DoublePulsar Exploit Widely Used Online
If you are a member of a read team or you have received a pen-rest report from such, then it […]
NSA`s DoublePulsar Exploit Widely Used Online Read More »
If you are a member of a read team or you have received a pen-rest report from such, then it […]
NSA`s DoublePulsar Exploit Widely Used Online Read More »
A new cheap Ransomware-as-a-Service (RaaS) has been detected by security experts from the threat intelligence firm Recorded Future. Dubbed Karmen,
Cheap RaaS Deletes Decryptor When Detecting Analysis Software Read More »
Forcepoint security experts have discovered that the creator of the CradleCore ransomware is selling their product on underground forums as
CradleCore Ransomware Available as RaaS Read More »
Security experts alert that cybercriminals have been exploiting a recently patched Apache Struts 2 flaw to distribute the Cerber ransomware.
Apache Struts Bug Exploited to Deliver the Cerber Ransomware Read More »
The third set of stolen CIA documents has recently been released. After Year Zero and Dark Matter, WikiLeaks has now
WikiLeaks Exposes CIA’s Anti-Forensics Tool Read More »
A couple of weeks ago, a lobby group of big internet providers like Verizon and Comcast attacked a set of
Internet Spies On You Despite Web Traffic Encryption Read More »
The iOS security bug that was used by cybercriminals to blackmail users into paying a ransom fee to unlock their
Apple iOS Safari Bug Used In A Ransom Scam Read More »
ERPScan security researchers alerted that a remote code execution (RCE) vulnerability has been found in SAP GUI (Graphical User Interface).
RCE Flaw in SAP GUI Exposes Company Networks to Malware Attacks Read More »
The security researcher Matt Nelson reveals that a newly discovered User Account Control (UAC) bypass that uses App Paths can
User Account Control Bypass Can Be Used for Fileless Attacks Read More »
Trend Micro security experts have discovered a new PoS malware, named MajikPOS, that is currently targeting North American and Canadian
North American and Canadian Businesses Targeted by MajikPOS Malware Read More »
Intel Security published a rootkit checker tool after WikiLeaks Vault 7 revelations regarding firmware vulnerabilities in popular hardware. The Vault
Intel Security Releases an EFI Rootkit Checker After the Vault 7 Leaks Read More »
Vault 7, which Wikileaks finally opened, didn’t reveal good news. What it did reveal is the CIA`s wide hacking capacity.
CIA Can Bypass the Encryption Layers of Popular Messaging Apps Read More »
Kaspersky and ESET security companies have updated their decryption keys for the Dharma ransomware, thanks to following a Pastebin link.
Files Locked by Dharma Ransomware Variants Can Now Be Decrypted Read More »
A new strain of ransomware was discovered and analyzed last week. According to researchers, the new piece is targeting one
Files Locked by Filecoder Mac Ransomware Can Be Decrypted Now Read More »
GuardiCore alarms that thousands of MySQL databases are targeted by ransom attacks, which are probably inspired by the MongoDB ransack
New Ransom Attacks are Targeting MySQL Databases Read More »