wholeaked is a file-sharing tool that allows you to find the responsible person in case of a leakage. It’s written …
Best Ransomware Protection
Ransomware attacks targeting governments, businesses, hospitals, and private individuals are rising. It has become a vast online issue that affects …
CISA Cautions of Attacks on UPS Devices
The Energy Department and the US Cybersecurity and Infrastructure Security Agency (CISA) published guidelines this week on preventing attacks on …
Slyther – AWS Security Tool
Slyther is AWS Security tool to check read/write/delete access for S3 buckets Requirements Installation pip3 install -r requirements.txt Usage …
Hacktivists Leak Email Data from Russian Pipeline Giant Transneft
Amid Russia’s war with Ukraine, Russian state-backed businesses continue to face attacks and data leaks from hackers. A website famous …
Severe Vulnerability Patched in CRI-O Container Engine for Kubernetes
A report by CrowdStrike reveals that an extreme weakness affecting the CRI-O container engine for Kubernetes could be utilized to …
Meta Releases Open-Source Browser Extension for Checking Code Authenticity
Meta, which is Facebook’s parent company, has announced the release of new technology that it aims to implement in its …
New Trick by DDoS Attackers to Knock over Websites
Attackers are finding new ways to access the websites and the browsers of different clients, affecting the user experience. The …
CISA Warns of Imminent Exploits on Zabbix Monitoring Tool’s Recent Vulnerabilities
This week, CISA updated Known Exploited Vulnerabilities Catalog by adding two flaws emanating from Zabbix monitoring solution. The two vulnerabilities, …
Attacks against Customers of Top Brands Bank of America and Wells Fargo by Trickbot
Cybersecurity professionals have to deal with the increasing threat of Trickbot malware. The malware uses phishing attacks and web injections …