Posts

Latest Threats
Malicious Code Bombs Target Amazon, Lyft, Slack, Zillow

Malicious Code Bombs Target Amazon, Lyft, Slack, Zillow

Attackers have weaponized code dependency confusion to target internal apps at tech...

Latest Threats
RTM Cybergang Adds New Quoter Ransomware to Crime Spree

RTM Cybergang Adds New Quoter Ransomware to Crime Spree

The Russian-speaking RTM threat group is targeting organizations in an ongoing campaign...

Latest Threats
Home-Office Photos: A Ripe Cyberattack Vector

Home-Office Photos: A Ripe Cyberattack Vector

Threat actors can use personal information gleaned from images to craft targeted...

Politics & Governance
Officials in Baltimore and St. Louis Put the Brakes on Persistent Surveillance Systems Spy Planes

Officials in Baltimore and St. Louis Put the Brakes on...

Baltimore, MD and St. Louis, MO, have a lot in common. Both cities suffer from declining...

Latest Threats
Mobile Adware Booms, Online Banks Become Prime Target for Attacks

Mobile Adware Booms, Online Banks Become Prime Target for...

A snapshot of the 2020 mobile threat landscape reveals major shifts toward adware...

Latest Threats
Ryuk Ransomware: Now with Worming Self-Propagation

Ryuk Ransomware: Now with Worming Self-Propagation

The Ryuk scourge has a new trick in its arsenal: Self-replication via SMB shares...

Latest Threats
Compromised Website Images Camouflage ObliqueRAT Malware

Compromised Website Images Camouflage ObliqueRAT Malware

Emails spreading the ObliqueRAT malware now make use of steganography, disguising...

Exploits
Fake-Sms - A Simple Command Line Tool Using Which You Can Skip Phone Number Based SMS Verification By Using A Temporary Phone Number That Acts Like A Proxy

Fake-Sms - A Simple Command Line Tool Using Which You Can...

A simple command line tool using which you can skip phone number based SMS verification...

Latest Threats
Passwords, Private Posts Exposed in Hack of Gab Social Network

Passwords, Private Posts Exposed in Hack of Gab Social...

The Distributed Denial of Secrets group claim they have received more than 70 gigabytes...

Exploits
Halogen - Automatically Create YARA Rules From Malicious Documents

Halogen - Automatically Create YARA Rules From Malicious...

Halogen is a tool to automate the creation of yara rules against image files embedded...

Latest Threats
Firewall Vendor Patches Critical Auth Bypass Flaw

Firewall Vendor Patches Critical Auth Bypass Flaw

Cybersecurity firm Genua fixes a critical flaw in its GenuGate High Resistance Firewall,...

Exploits
OWASP ASST (Automated Software Security Toolkit) - A Novel Open Source Web Security Scanner

OWASP ASST (Automated Software Security Toolkit) - A Novel...

OWASP ASST (Automated Software Security Toolkit) | A Novel Open Source Web Security...

Latest Threats
Jailbreak Tool Works on iPhones Up to iOS 14.3

Jailbreak Tool Works on iPhones Up to iOS 14.3

The UnC0ver team took advantage of an iOS flaw patched in January in its latest...

Latest Threats
Post-Cyberattack, Universal Health Services Faces $67M in Losses

Post-Cyberattack, Universal Health Services Faces $67M...

The Fortune-500 hospital network owner is facing steep costs in damages after a...

Latest Threats
Malware Loader Abuses Google SEO to Expand Payload Delivery

Malware Loader Abuses Google SEO to Expand Payload Delivery

Gootloader has expanded its payloads beyond the Gootkit malware family, using Google...

Politics & Governance
What the AT&T Breakup Teaches Us About a Big Tech Breakup

What the AT&T Breakup Teaches Us About a Big Tech Breakup

The multi-pronged attempt by state Attorneys General, the Department of Justice,...

Politics & Governance
Federal Court Agrees: Prosecutors Can’t Keep Forensic Evidence Secret from Defendants

Federal Court Agrees: Prosecutors Can’t Keep Forensic Evidence...

When the government tries to convict you of a crime, you have a right to challenge...

Politics & Governance
From Creativity to Exclusivity: The German Government's Bad Deal for Article 17

From Creativity to Exclusivity: The German Government's...

The implementation process of Article 17 (formerly Article 13) of the controversial...

Politics & Governance
The SAFE Tech Act Wouldn't Make the Internet Safer for Users

The SAFE Tech Act Wouldn't Make the Internet Safer for...

Section 230, a key law protecting free speech online since its passage in 1996,...

Politics & Governance
Virginia's Weak Privacy Bill Is Just What Big Tech Wants

Virginia's Weak Privacy Bill Is Just What Big Tech Wants

Virginia’s legislature has passed a bill meant to protect consumer privacy—but the...

Exploits
WdToggle - A Beacon Object File (BOF) For Cobalt Strike Which Uses Direct System Calls To Enable WDigest Credential Caching

WdToggle - A Beacon Object File (BOF) For Cobalt Strike...

A Proof of Concept Cobalt Strike Beacon Object File which uses direct system calls...

Exploits
Gargamel - A Forensic Evidence Acquirer

Gargamel - A Forensic Evidence Acquirer

A Forensic Evidence Acquirer Compile Assuming you have Rust 1.41+ installed. Open...

Exploits
Pillager - Filesystems For Sensitive Information With Go

Pillager - Filesystems For Sensitive Information With Go

Pillager is designed to provide a simple means of leveraging Go's strong concurrency...

Exploits
Gatekeeper - First Open-Source DDoS Protection System

Gatekeeper - First Open-Source DDoS Protection System

Gatekeeper is the first open source DoS protection system. It is designed to scale...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here