I Got Banned… Really!
Kali Linux Tutorials,OFFENSIVE ETHICAL HACKING TUTORIALS,DEFENSIVE BLUE TEAM TUTORIALS,DANNY BOY AI Cybersecurity Tutorials
March 15, 2024
I Got Banned… Really! Hey guys, Dan here. Soooooo. My awesome video on OSINT was tak3n d0wn! Well, what do you think?
0 Comments1 Minute
Fortinet Identifies Severe SQL Injection Vulnerability in FortiClientEMS Software
Emergency Response & Forensics
March 14, 2024
Fortinet recently issued a warning highlighting a critical vulnerability in its FortiClientEMS software. This vulnerability poses a significant risk, potentially enabling malicious actors to execute code on affected systems, which could lead to data breaches, system downtime, and other severe…
0 Comments4 Minutes
Cybercriminals Using GitHub and AWS to deploy STRRAT Trojans and VCURMS
Emergency Response & Forensics
March 13, 2024
A Java-based downloader is being maliciously employed in a recent phishing campaign aimed at distributing remote access trojans (RATs) such as VCURMS and STRRAT. Yurren Wan, a researcher at Fortinet FortiGuard Labs, stated that “the attackers stored malware on public services like Amazon Web…
0 Comments4 Minutes
WordPress Users Beware! Malware Strikes 3,900+ Sites via Popup Builder Plugin
Emergency Response & Forensics
March 12, 2024
A high-severity security hole in the Popup Builder plugin for WordPress is being used by a new malware operation to add harmful JavaScript code. It is said that over the last three weeks, the operation has infected over 3,900 sites. In a March 7 report, security expert Puja Srivastava said,…
0 Comments4 Minutes
Microsoft Reveals Russian Hackers Accessed Customer Secrets and Source Code
Emergency Response & Forensics
March 11, 2024
Midnight Blizzard, also known as APT29 or Cozy Bear, operates under Kremlin support and poses a significant threat. Following a breach detected in January 2024, they infiltrated Microsoft’s internal systems and accessed portions of its source code. “In recent weeks, we have seen…
0 Comments4 Minutes
Hacked WordPress sites are using visitors’ browsers for brute-force attacks.
Emergency Response & Forensics
March 7, 2024
New findings from Sucuri shows that threat actors are using malicious JavaScript injections to launch brute-force attacks against WordPress sites. According to Denis Sinegubko, a security researcher, the attacks are distributed brute-force attacks that “target WordPress websites from the…
0 Comments4 Minutes
Hackers use flaws in ConnectWise ScreenConnect to spread TODDLERSHARK malware.
Emergency Response & Forensics
March 6, 2024
North Korean threat actors have used the newly found security holes in ConnectWise ScreenConnect to spread a new piece of malware called TODDLERSHARK. A report from Kroll that was given to The Hacker News says that TODDLERSHARK is similar to other known Kimsuky malware like BabyShark and…
0 Comments4 Minutes
There are over 225,000 stolen ChatGPT credentials for sale on the dark web.
Security Audits & Penetration Testing
March 5, 2024
According to new research from Group-IB reveals a concerning trend between January and October 2023. During this period, an alarming number of over 225,000 stolen ChatGPT credentials were traded on illicit online platforms. These compromised credentials were found in logs associated with notorious…
0 Comments4 Minutes
This TOOL Makes You Disappear on KALI LINUX // FULL Beginner TUTORIAL
Kali Linux Tutorials,DANNY BOY AI Cybersecurity Tutorials
March 1, 2024
This TOOL Makes You Disappear on KALI LINUX // FULL Beginner TUTORIAL In this Kali Linux tutorial for beginners, we delve into the intricacies of achieving complete anonymity on Kali using the powerful WHOAMI tool.
0 Comments1 Minute
A Tax-Themed Phishing Scam Propagating TimbreStealer Malware Targeting IT Users
Cybersecurity Awareness Training
February 29, 2024
Since as far back as November 2023, Mexican users have been the target of an intricately designed tax-themed scam email. This sophisticated scheme disseminates a type of Windows malware, previously unseen and now identified as TimbreStealer. Cisco Talos detected the activity and noted the…
0 Comments4 Minutes