Posts

Politics & Governance
1000 Californians Have Asked Their Representatives To Fix Our Broken Broadband System. Have You?

1000 Californians Have Asked Their Representatives To Fix...

The California legislature has been handed what might be their easiest job this...

Latest Threats
Unpatched Bugs Found Lurking in Provisioning Platform Used with Cisco UC

Unpatched Bugs Found Lurking in Provisioning Platform Used...

A trio of security flaws open the door to remote-code execution and a malware tsunami.

Latest Threats
Baby Clothes Giant Carter’s Leaks 410K Customer Records

Baby Clothes Giant Carter’s Leaks 410K Customer Records

Purchase automation software delivered shortened URLs without protections.

Latest Threats
REvil Hits US Nuclear Weapons Contractor: Report

REvil Hits US Nuclear Weapons Contractor: Report

"We hereby keep a right (sic) to forward all of the relevant documentation and data...

Latest Threats
Cyberpunk 2077 Hacked Data Circulating Online

Cyberpunk 2077 Hacked Data Circulating Online

CD Projekt Red confirmed that employee and game-related data appears to be floating...

Latest Threats
Monumental Supply-Chain Attack on Airlines Traced to State Actor

Monumental Supply-Chain Attack on Airlines Traced to State...

Airlines are warned to scour networks for traces of the campaign, likely the work...

Latest Threats
‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts

‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts

The group, known for masquerading as various APT groups, is back with a spate of...

Latest Threats
Chrome Browser Bug Under Active Attack

Chrome Browser Bug Under Active Attack

Google has patched its Chrome browser, fixing one critical cache issue and a second...

Latest Threats
STEM Audio Table Rife with Business-Threatening Bugs

STEM Audio Table Rife with Business-Threatening Bugs

The desktop conferencing IoT gadget allows remote attackers to install all kinds...

Politics & Governance
The ACCESS ACT Takes a Step Towards a More Interoperable Future

The ACCESS ACT Takes a Step Towards a More Interoperable...

When it comes to online services, there are a few very large companies whose gravitational...

Latest Threats
Microsoft: Big Cryptomining Attacks Hit Kubeflow

Microsoft: Big Cryptomining Attacks Hit Kubeflow

Misconfigured dashboards are yet again at the heart of a widespread, ongoing cryptocurrency...

Latest Threats
Steam Gaming Platform Hosting Malware

Steam Gaming Platform Hosting Malware

Emerging malware is lurking in Steam profile images.

Latest Threats
Mysterious Custom Malware Collects Billions of Stolen Data Points

Mysterious Custom Malware Collects Billions of Stolen Data...

A nameless malware resulted in a huge data heist of files, credentials, cookies...

Latest Threats
Intel Plugs 29 Holes in CPUs, Bluetooth, Security

Intel Plugs 29 Holes in CPUs, Bluetooth, Security

The higher-rated advisories focus on privilege-escalation bugs in CPU firmware:...

Politics & Governance
The GDPR, Privacy and Monopoly

The GDPR, Privacy and Monopoly

In Privacy Without Monopoly: Data Protection and Interoperability, we took a thorough...

Latest Threats
DarkSide Pwned Colonial With Old VPN Password

DarkSide Pwned Colonial With Old VPN Password

Attackers accessed a VPN account that was no longer in use to freeze the company’s...

Latest Threats
Microsoft Patch Tuesday Fixes 6 In-The-Wild Exploits, 50 Flaws

Microsoft Patch Tuesday Fixes 6 In-The-Wild Exploits, 50...

Researchers discovered a highly targeted malware campaign launched in April, in...

Politics & Governance
Victory! Dartmouth Ends Unfounded Cheating Investigation After Students, Rights Groups Speak Out

Victory! Dartmouth Ends Unfounded Cheating Investigation...

The Dartmouth Geisel School of Medicine has ended its months-long dragnet investigation into...

Politics & Governance
Big Data Profits If We Deregulate HIPAA

Big Data Profits If We Deregulate HIPAA

This blog post was written by Kenny Gutierrez, EFF Bridge Fellow. Recently proposed...

Exploits
BlueCloud - Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D

BlueCloud - Cyber Range including Velociraptor + HELK system...

Cyber Range deployment of HELK and Velociraptor! Automated terraform deployment...

Exploits
Interactsh - An OOB Interaction Gathering Server And Client Library

Interactsh - An OOB Interaction Gathering Server And Client...

Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed...

Exploits
Libinjection - SQL / SQLI Tokenizer Parser Analyzer

Libinjection - SQL / SQLI Tokenizer Parser Analyzer

SQL / SQLI tokenizer parser analyzer. For C and C++ PHP Python Lua Java (external...

Exploits
Neurax - A Framework For Constructing Self-Spreading Binaries

Neurax - A Framework For Constructing Self-Spreading Binaries

A framework that aids in creation of self-spreading software Requirements go get...

Politics & Governance
EFF Files Amicus Brief Defending the Right to Repair in Massachusetts

EFF Files Amicus Brief Defending the Right to Repair in...

This week, EFF joined with several prominent right-to-repair groups to file an amicus...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here