MyRepublic says almost 80,000 of its mobile subscribers in Singapore have had their personal data compromised, following a security breach… Read More
gargantuan hashcat rulesets generated from compromised passwords Project maintenance warning: This project is deemed completed. No pull requests or changes… Read More
Attackers rely on convincing emails and a few other techniques to bypass detection, that includes an Office 365 phishing page,… Read More
Since at least June 2020, Pulse Secure devices at U.S. government agencies, critical infrastructure entities, and private sector organizations have… Read More
While a ransomware attack was launched against the Alabama-based Wiregrass Electric Cooperative during the weekend, officials have verified that no… Read More
The network intrusion was revealed by the technology outlet Version2, which obtained official documents from the Danish central bank through… Read More
The hack that took down the largest fuel pipeline in the U.S. and led to shortages across the East Coast… Read More
The FBI will soon start to share compromised passwords that were discovered during law enforcement investigations with the Have I… Read More
Researchers at Sophos have reported that an unknown attacker is attempting to use a compromised Microsoft Exchange Server to deliver… Read More
The data breach on Card Mafia, a forum for stealing and trading credit cards, exposed email addresses, hashed passwords, usernames,… Read More
Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down… Read More
To compromise the PHP codebase, two malicious commits were pushed to a Git repository maintained by the PHP development team.… Read More
A golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a… Read More
Hackers have come up with a sneaky method to steal payment card data from compromised online stores that reduces the… Read More
Using Zoom invites as a lure and an extensive list of email addresses, the operators of the campaign delivered messages… Read More
Dubbed "Gootloader," the expanded Javascript-based malware delivery system comes amid a surge in the number of infections targeting users in… Read More