Cybersecurity researchers have unearthed a fourth new malware strain—designed to spread the malware onto other computers in victims’ networks—which was deployed as...
Cybersecurity researchers have disclosed a series of attacks by a threat actor of Chinese origin that has targeted organizations in Russia and...
Cybersecurity researchers, for the first time, may have found a potential connection between the backdoor used in the SolarWinds hack to a...
The attack requires the attacker to have physical access to the victim’s Titan Key, hours of time, and side-channel setup equipment worth...
Threat actors such as the notorious Lazarus group are continuing to tap into the ongoing COVID-19 vaccine research to steal sensitive information...
Israeli Researchers Discover New Data Exfiltration Technique by Turning RAM into Wi-Fi Card. According to the Ben-Gurion University of the Negev, Israel...
The researcher identified over 75000 data points of his phone being tracked. Most of us already know that our smartphones are being...
The hack occurred when researchers identified significant security flaws in the key fob of Tesla’s top-of-the-line SUV, Tesla Model X, the luxury...
A small contribution to community 🙂 We use all these tools in security assessments and in our vulnerability monitoring service Check...
NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool...
Hetty is an HTTP toolkit for security research. It aims to become an open source alternative to commercial software like Burp...
The Dutch researcher Victor Gevers guessed the password of President Trump’s personal Twitter account as MAGA2020 and noticed he did not...
The researcher took advantage of the Fitbit gallery which allows developers to submit apps that enhance the functionality of the core...
IoTMap is a tool that models IoT networks using one or multiple protocols simultaneously. This is work in progress, as a...
A Philadelphia tech company has suffered a severe ransomware attack. The incident is specially warning as the affected company provides the software...
More often than not, we come across infamous malicious groups who target different victims using the same piece of malware. In such...
Writing advanced malware for a threat actor requires different groups of people with diverse technical expertise to put them all together. But...
The researcher hacked Facebook after identifying and exploiting Unauthenticated RCE on MobileIron’s Mobile Device Management (MDM) used by the company’s employees. Not...
Cybersecurity researchers uncovered fresh evidence of an ongoing cyberespionage campaign against Indian defense units and armed forces personnel at least since 2019...
Guan Lei who is on a J-1 nonimmigrant visa works for the UCLA and is accused of sharing sensitive data and technology...
ezEmu enables users to test adversary behaviors via various execution techniques. Sort of like an “offensive framework for blue teamers“, ezEmu...