Ransom Groups are not too honest 👎

Ransomware gangs are progressively probable to break their assure not to leak stolen data as soon as a victim has compensated them, Coveware has warned. Nevertheless, the tactic has now…

Torisma 🌀

A sophisticated cyber espionage campaign aimed at aerospace and defense sectors in Australia, Israel, Russia, and defense contractors based in Russia and India , whic will install data gathering implants…

KillSomeOne ☠️ To Curious Clue

APT cloaks identity using script-kiddie messages and advanced deployment and targeting techniques. Based on messages, such as “KilllSomeOne”, used in attack code strings, coupled with advanced deployment and targeting techniques,…

Regret locker 👿 soon you will regret

A new ransomware called RegretLocker uses a variety of advanced features that allows it to encrypt virtual hard drives and close open files for encryption. RegretLocker was discovered earlier last…

Google Successive 0 Day

Google has just released a fix for the second actively exploited Chrome zero-day security flaw in two weeks. CVE-2020-16009 is a v8 bug used for remote code execution,The fix applies…

Solaris 0 Day (:)

A new hacker group, dubbed UNC1945, which has been observed using a vulnerability in the Oracle’s Solaris OS to hack into corporate networks. The vulnerability (CVE-2020-14871) in question affects Oracle…

NAT Slipstream <–!–>

A new research has demonstrated a technique that allows an attacker to bypass firewall protection and remotely access any TCP/UDP service on a victim machine. Called NAT Slipstreaming, the method…