Hacking

Vice Society gang is using a custom PowerShell tool for data exfiltration

Vice Society ransomware operators have been spotted using a PowerShell tool to exfiltrate data from compromised networks. Palo Alto Unit…

3 years ago

Experts warn of an emerging Python-based credential harvester named Legion

Legion is an emerging Python-based credential harvester and hacking tool that allows operators to break into various online services. Cado…

3 years ago

Experts found the first LockBit encryptor that targets macOS systems

Researchers warn that the LockBit ransomware gang has developed encryptors to target macOS devices. The LockBit group is the first…

3 years ago

NCR was the victim of BlackCat/ALPHV ransomware gang

NCR was the victim of the BlackCat/ALPHV ransomware gang, the attack caused an outage on the company's Aloha PoS platform.…

3 years ago

Kodi discloses data breach after its forum was compromised

Open-source media player software provider Kodi discloses a data breach after threat actors stole its MyBB forum database. Kodi has…

3 years ago

The Russia-linked APT29 is behind recent attacks targeting NATO and EU

Poland intelligence linked the Russian APT29 group to a series of attacks targeting NATO and European Union countries. Poland's Military…

3 years ago

A flaw in the Kyocera Android printing app can be abused to drop malware

Security experts warn that a Kyocera Android printing app is vulnerable to improper intent handling and can be abused to drop…

3 years ago

QuaDream surveillance firm’s spyware targeted iPhones with zero-click exploit

At least five members of civil society worldwide have been targeted with spyware and exploits developed by surveillance firm QuaDream.…

3 years ago

Cybercrime group exploits Windows zero-day in ransomware attacks

Microsoft has addressed a zero-day in the Windows Common Log File System (CLFS) actively exploited in ransomware attacks. Microsoft has…

3 years ago

A “By-Design” flaw in Microsoft Azure can allow storage accounts takeover

A flaw in Microsoft Azure could be exploited by attackers to gain access to storage accounts, perform lateral movements, and…

3 years ago

This website uses cookies.