The Agrius hacking group has shifted from using purely destructive wiper malware to a combination of wiper and ransomware functionality …
What to do after a Ransomware Attack?
What do you do when you wake up one morning and realise that your log in credentials into your system …
FireStorePwn – Firestore Database Vulnerability Scanner Using APKs
fsp scans an APK and checks the Firestore database for rules that are not secure, testing with or without authentication. …
Russian national jailed for running stolen data, hijacked account seller platform deer.io
A Russian national has been jailed for 2.5 years for operating deer.io, a platform designed for the sale of stolen …
Qvm-Create-Windows-Qube – Spin Up New Windows Qubes Quickly, Effortlessly And Securely
qvm-create-windows-qube is a tool for quickly and conveniently installing fresh new Windows qubes with Qubes Windows Tools (QWT) drivers automatically. …
Bluetooth bugs open the door for attackers to impersonate devices
Threat actors could exploit vulnerabilities in the Bluetooth Core and Mesh specifications to impersonate devices during pairing, paving the way …
Not as complex as we thought: Cyberattacks on operational technology are on the rise
Attacks on control processes, such as systems in industrial settings, are on the rise with common and unsophisticated methods being …
Solr-GRAB – Steal Apache Solr Instance Queries With Or Without A Username And Password
Steal Apache Solr instance Queries with or without a username and password. DISCLAIMER: This project should be used for authorized …
MurMurHash – Tool To Calculate A MurmurHash Value Of A Favicon To Hunt Phishing Websites On The Shodan Platform
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. …
FBI identifies 16 Conti ransomware attacks striking US healthcare, first responders
The Federal Bureau of Investigation (FBI) has linked the Conti ransomware group to at least 16 attacks aimed at disrupting …