Adrozek Malware Delivers Fake Ads to 30K Devices a Day

0
The Adrozek ad-injecting browser modifier malware also extracts device data and steals credentials, making it an even more dangerous threat. A persistent malware campaign called...

Cyber Vulnerabilities & Exploits

The latest hacker news

, Cybersecurity News & Education

FBI, CISA, NSA Officially Blame Russia for SolarWinds Cyber Attack

0
By: Ravie Lakshmanan The U.S. government on Tuesday formally pointed fingers at the Russian government for orchestrating the massive SolarWinds supply chain attack that came...
, Cybersecurity News & Education

Anonymous Hackers Re-Emerge Amid Unrest of George Floyd

0
George Floyd: Anonymous hackers re-emerge amid US unrest By David Molloy & Joe Tidy from BBC As the United States deals with widespread civil unrest across...
, Cybersecurity News & Education

Alert — There’s A New Malware Out There Snatching Users’ Passwords

0
By: Ravie Lakshmanan A previously undocumented malware downloader has been spotted in the wild in phishing attacks to deploy credential stealers and other malicious payloads. Dubbed...

Learning & Cyber Education

The UNC2529 Triple Double: A Trifecta Phishing Campaign

0
In December 2020, Mandiant observed a widespread, global phishing campaign targeting numerous organizations across an array of industries. Mandiant tracks this threat actor as...

Breaches & Data Leaks

Maze Ransomware Attackers Hijacked Cognizant’s Tax ID, Social Security & Passport...

0
'We have determined that the personal information involved in this incident included your name and one or more of: your Social Security number and/or...

Cybercrime

Social Media Accounts

69FollowersFollow
201FollowersFollow
6SubscribersSubscribe
- Advertisement -
, Cybersecurity News & Education
, Cybersecurity News & Education

Russia slows Twitter’s speed over failure to remove banned content

0
Russia’s state communications watchdog said on Wednesday it was restricting the use of Twitter by slowing down its speed, accusing the social media platform...
, Cybersecurity News & Education

Packet Storm New Exploits For February, 2021

0
Authored by Todd J. | Site packetstormsecurity.com This archive contains all of the 189 exploits added to Packet Storm in February, 2021.
, Cybersecurity News & Education

Gstreamer Matroska Demuxing Use-After-Free

0
Authored by Google Security Research, natashenka Gstreamer suffers from a use-after-free vulnerability in Matroska demuxing. advisories | CVE-2021-3498

Security & Hacking Tools

, Cybersecurity News & Education

Shad0w – Modular C2 Framework

0
SHAD0W is a modular C2 framework designed to successfully operate on mature environments. It uses a range of methods to evade EDR and AV while...
, Cybersecurity News & Education

Big Bounty Recon – Reconnaissance Tool

0
BigBountyRecon BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target...
, Cybersecurity News & Education

GitDorker – Scrape Secrets From GitHub Through Usage Of A Large Repository

0
GitDorker is a tool that utilizes the GitHub Search API and an extensive list of GitHub dorks that I’ve compiled from various sources to...
, Cybersecurity News & Education

Pesidious – Malware Mutation Using Reinforcement Learning

0
Malware Mutation using Deep Reinforcement Learning and GANs The purpose of the tool is to use artificial intelligence to mutate a malware (PE32 only) sample to bypass...
, Cybersecurity News & Education

Hellraiser – CVE-Search Vulnerability Scanner

0
HellRaiser Vulnerability Scanner Install HellRaiser depends on cve-search API. Have a cve-search API running and add the address in config/config.yml on cvesearch_api_domain field. Install ruby, bundler and rails. https://gorails.com/setup/ubuntu/16.04 Install redis-server and nmap. sudo apt-get update sudo apt-get...

Daily Exploits

, Cybersecurity News & Education

WoWonder Social Network Platform 3.1 Authentication Bypass

0
Authored by securityforeveryone.com WoWonder Social Network Platform version 3.1 suffers from an authentication bypass vulnerability. Change Mirror Download # Exploit Title: WoWonder Social Network Platform 3.1 -...
, Cybersecurity News & Education

Backdoor.Win32.Zombam.gen Cross Site Scripting

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Zombam.gen malware suffers from a cross site scripting vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source:...
, Cybersecurity News & Education

Backdoor.Win32.Zombam.gen Code Execution

0
Authored by malvuln | Site malvuln.com Backdoor.Win32.Zombam.gen malware suffers from a code execution vulnerability. Change Mirror Download Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/ff6516c881dee555b0cd253408b64404_B.txtContact:...

Offensive & Defensive Security Tools