Posts From Mo Moin

Experts at Skylight Cyber released the list of 600 MAC addresses used threat actors behind Operation ShadowHammer to target ASUS customers. Skylight Cyber released the list of 583 MAC addresses used threat actors behind Operation ShadowHammer to target ASUS customers.

A new wave of Emotet malware campaign distribute the Nozelesn ransomware that targets hospitality industries based endpoint systems via malicious word documents. Telemetry had over 14,000 detections via emotet spam emails that are distributed all over the world between January

FireEye released Commando VM, a Windows-based security distribution designed for penetration testers that intend to use the Microsoft OS. FireEye released Commando VM, the Windows-based security distribution designed for penetration testing and red teaming. FireEye today released an automated installer

Osmedeus is a fully automated tool that allows you to run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. How to use If you have no idea what are you doing just type the command

Single Sign-on is a method of authentication process that helps to log in multiple application using single login credentials. Security is enhanced through Single Sign-on (SSO) in light of the fact that users are diminished of the various secret password

Cyber Criminals launching a new malware via weaponized PDF & MS Word Version of New Zealand terror suspect’s manifesto. Researchers noticed 8chan, an imageboard website composed of user-created boards contains several posts that link to a manifesto, allegedly authored by

Bithumb Hacked 3rd time, Yes, One of the worlds largest cryptocurrency exchange Bithumb Hacked by unknown cybercriminals and stolen nearly $20 million worth cryptocurrencies from its wallet. Bithumb is a South Korean cryptocurrency exchange allegedly facing continuous cyber attacks since

Toyota hacked, yes, Toyota major subsidiaries network compromised by unknown hackers and they gained unauthorized access to the network where Toyota stored nearly 3.1 million customers sensitive information. Toyota Motor Corporation is a Japan-based, world’s second-largest automotive manufacturer who produces

You may be a victim for ShadowHammer hack, here is the complete list of the MAC Address, tool to check for infection and the update to resolve the issues. Operation ShadowHammer targeted the ASUS computers software update tool to inject

The 20-year-old security researcher James Lee publicly disclosed details and proof-of-concept exploits for two zero-day vulnerabilities in Microsoft web browsers. The expert opted to disclose the flaw after the tech giant allegedly failed to address the zero-day issues privately he

Hackers continue to employ new techniques to evade detection from antivirus and other security products. This time they started using previously reported and widely used BOM technique. Previously Russian hacker groups used this technique to modify the hosts file on

Despite making some progress, a trio of email security protocols has seen a rocky road of deployment in the past year. Going by their acronyms SPF, DKIM and DMARC, the three are difficult to configure and require careful study to

The Magento content management system used by thousands of online shops has received fixes for several serious vulnerabilities, including an unauthenticated SQL injection flaw that’s likely to soon become a target for attackers. Magento, an Adobe-owned company since 2018, released

Gustuff a fully automated baking malware that abuses the accessibility Service to steal login credentials from 100+ global bank accounts and robs users of 32 cryptocurrency apps. The Accessibility Services in Android devices is to assist users with disabilities in

John the Ripper is a fast password cracker which is intended to be both elements rich and quick. It combines a few breaking modes in one program and is completely configurable for your specific needs for Offline Password Cracking. Out

Relentless espionage Group also called as aka APT33 (Elfin) targeting various organization in Saudi Arabia and United States by deploying a variety of malware in their network. Aka APT33 group specifically targeting corporate networks and it compromised around 50 organizations