Here’s our latest round-up of hacking tools available to pen testers, enterprise security specialists, and other infosec professionals at the start of the third quarter of...
Google’s Threat Analysis Group (TAG) has blocked dozens of malicious domains and websites used by hack-for-hire groups in attacks targeting high-risk targets worldwide. Unlike commercial surveillance...
Microsoft has fixed a container escape bug dubbed FabricScape in the Service Fabric (SF) application hosting platform that let threat actors escalate privileges to root, gain control of...
Security teams have a new tool to hunt for malware, using open source YARA rules. YARAify can scan files using public YARA rules, integrate public and non-public...
A poor implementation of Ed25519, a popular digital signature algorithm, has left dozens of cryptography libraries vulnerable to attacks. According to Konstantinos Chalkias, a cryptographer at...
Deliveries of prepared meals to thousands of vulnerable people in England continue to be disrupted following a “sophisticated” cyber-attack on food distributor Apetito. Apetito’s impacted UK...
The number of new ransomware families and unique variants has fallen over the last year, according to new research from WithSecure. The company, formerly known as...
Two Chinese hacking groups conducting cyber espionage and stealing intellectual property from Japanese and western companies are deploying ransomware as a decoy to cover up their...
The Conti cybercrime syndicate runs one of the most aggressive ransomware operations and has grown highly organized, to the point that affiliates were able to hack...
Almost one in three detected Russian attacks are successful, Microsoft said. Four months into its war on Ukraine, Russia is carrying out cyber operations on much...