Posts

Latest Threats
DOJ: Creep Coach Finagles Nude Athlete Photos

DOJ: Creep Coach Finagles Nude Athlete Photos

Allegedly perv college coach charged with cyberstalking and extorting nudes from...

Latest Threats
623M Payment Cards Stolen from Cybercrime Forum

623M Payment Cards Stolen from Cybercrime Forum

The database was subsequently leaked elsewhere, imperiling consumers from the U.S....

Latest Threats
Network Detection & Response: The Next Frontier in Fighting the Human Problem

Network Detection & Response: The Next Frontier in Fighting...

Justin Jett, director of audit and compliance for Plixer, discusses the transformation...

Latest Threats
Data from 500M LinkedIn Users Posted for Sale Online

Data from 500M LinkedIn Users Posted for Sale Online

Like the Facebook incident earlier this week, the information — including user profile...

Exploits

PoisonApple - macOS Persistence Tool

Command-line tool to perform various persistence mechanism techniques on macOS....

Latest Threats
Adware Spreads via Fake TikTok App, Laptop Offers

Adware Spreads via Fake TikTok App, Laptop Offers

Cybercriminals are encouraging users to send the "offers" via WhatsApp to their...

Exploits
Redcloud - Automated Red Team Infrastructure Deployement Using Docker

Redcloud - Automated Red Team Infrastructure Deployement...

Redcloud is a powerful and user-friendly toolbox for deploying a fully featured...

Latest Threats
Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers

Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers

Cisco says it will not patch three small business router models and one VPN firewall...

Latest Threats
IcedID Banking Trojan Surges: The New Emotet?

IcedID Banking Trojan Surges: The New Emotet?

A widespread email campaign using malicious Microsoft Excel attachments and Excel...

Latest Threats
Azure Functions Weakness Allows Privilege Escalation

Azure Functions Weakness Allows Privilege Escalation

Microsoft's cloud-container technology allows attackers to directly write to files,...

Latest Threats
Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks

Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware...

Industrial enterprises in Europe are target of campaign, which forced a shutdown...

Latest Threats
Attackers Blowing Up Discord, Slack with Malware  

Attackers Blowing Up Discord, Slack with Malware  

One Discord network search turned up 20,000 virus results, researchers found.  

Latest Threats
Crossing the Line: When Cyberattacks Become Acts of War

Crossing the Line: When Cyberattacks Become Acts of War

Saryu Nayyar, CEO at Gurucul, discusses the new Cold War and the potential for a...

Politics & Governance
What Movie Studios Refuse to Understand About Streaming

What Movie Studios Refuse to Understand About Streaming

The longer we live in the new digital world, the more we are seeing it replicate...

Latest Threats
Fake Netflix App on Google Play Spreads Malware Via WhatsApp

Fake Netflix App on Google Play Spreads Malware Via WhatsApp

The wormable malware spread from Android to Android by sending messages offering...

Latest Threats
Facebook: Stolen Data Scraped from Platform in 2019

Facebook: Stolen Data Scraped from Platform in 2019

The flaw that caused the leak of personal data of more than 533 million users over...

Latest Threats
Critical Cloud Bug in VMWare Carbon Black Allows Takeover

Critical Cloud Bug in VMWare Carbon Black Allows Takeover

CVE-2021-21982 affects a platform designed to secure private clouds, and the virtual...

Politics & Governance
Organizations Call on President Biden to Rescind President Trump’s Executive Order that Punished Online Social Media for Fact-Checking

Organizations Call on President Biden to Rescind President...

President Joe Biden should rescind a dangerous and unconstitutional Executive Order...

Exploits
NtHiM - Super Fast Sub-domain Takeover Detection

NtHiM - Super Fast Sub-domain Takeover Detection

NtHiM - Super Fast Sub-domain Takeover Detection Installation Method 1: Using Pre-compiled...

Politics & Governance
India’s Strict Rules For Online Intermediaries Undermine Freedom of Expression

India’s Strict Rules For Online Intermediaries Undermine...

India has introduced draconian changes to its rules for online intermediaries, tightening...

Politics & Governance
The EU Online Terrorism Regulation: a Bad Deal

The EU Online Terrorism Regulation: a Bad Deal

On 12 September 2018, the European Commission presented a proposal for a regulation...

Exploits
Max - Maximizing BloodHound

Max - Maximizing BloodHound

Maximizing BloodHound. Description New Release: dpat - The BloodHound Domain Password...

Exploits
Columbo - A Computer Forensic Analysis Tool Used To Simplify And Identify Specific Patterns In Compromised Datasets

Columbo - A Computer Forensic Analysis Tool Used To Simplify...

Columbo is a computer forensic analysis tool used to simplify and identify specific...

Exploits
ThreatMapper - Identify Vulnerabilities In Running Containers, Images, Hosts And Repositories

ThreatMapper - Identify Vulnerabilities In Running Containers,...

The Deepfence Runtime Threat Mapper is a subset of the Deepfence cloud native workload...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here