The well-known ransomware Revil has elevated its attack vector to change the victim’s login password in order to reboot the computer into Windows Safe Mode. While malicious groups are always…
A new hacking tool for carrying out email attacks has been promoted by the threat actors on hacker forums since at least the middle of last year bypassing security passes…
CISA has released a Splunk-based dashboard, dubbed Aviary, that could be used by administrators in the post-compromise analysis of Microsoft AAD,O365,M365. This can be used to visualise and analyse data produced…
CyberBattleSim allows for the training of automated agents, and provides a Python-based OpenAI Gym interface for that. In the simulated environments, defenders can leverage reinforcement learning algorithms and set up…
Zerodium has tripled the payouts for exploits for the WordPress CMS that could be used to achieve remote code execution. Zerodium announced via Twitter that is temporarily offering a $300,000…
Visa, a global payment processor has warned that hackers are on the rise in deploying web shells in infected servers to steal credit card information from online customers. Web Shells…
Threat actors are actively exploiting the CVE-2018-13379 path traversal vulnerability in Fortinet VPNs to deploy a new piece of ransomware, tracked as Cring ransomware to organizations in the industrial sector.…
Using legitimate services such as Google Forms and Telegram to gather user data stolen on phishing websites by cybercriminals is getting common Ready-to-go platforms that automate phishing and which are…