WPCracker
WordPress user enumeration and login Brute Force tool for Windows and Linux
With the Brute Force tool, you can control how aggressive an attack you want to perform, and this affects the attack time required. The tool makes it possible to adjust the number of threads as well as how...
Bugs in Signal, Google Duo, and Facebook Messenger allowed the called party's device to transmit audio before it answered the call.
Vulnerabilities in a variety of mobile applications for video communication allowed attackers to listen to the surrounding sounds without the user's permission...
The hackers turned out to be skilled and methodical operators who follow best practices to ensure the security of operations.
Information security specialists from Microsoft shared details about how hackers who attacked the SolarWinds supply chain managed to remain unnoticed and hide their...
In total, the researchers identified seven vulnerabilities in the Dnsmasq software, combined under the name DNSpooq.
Specialists of the Israeli information security company JSOF have discovered a number of vulnerabilities in the popular Dnsmasq software that allow the "DNS cache poisoning"...
iFinex Inc needs another 30 days to produce trial documents for the New York Attorney General.
iFinex Inc — the parent company of crypto exchange Bitfinex and stablecoin issuer Tether (USDT) — has written to the New York Supreme Court requesting that its upcoming trial date be pushed back even...
Hackers used applications with privileged access to Microsoft Office 365 and Azure environments.
Security researchers from the information security firm Malwarebytes have confirmed that the cybercriminals responsible for the attack on the SolarWinds supply chain were able to access the...
Operation Enemies of the People began after the US presidential election and resumed during the storming of the Capitol.
The FBI reported on a malicious cyber operation called Enemies of the People ("Enemies of the People"), conducted by Iranian hackers against the US federal government, state...
Criminals could go unpunished because evidence collected from crime scenes was not recorded in the electronic system.
The UK government is assessing the possible consequences of a "technical error" that caused 150,000 records to be deleted from police databases, including suspects '...
Criminals could go unpunished because evidence collected from crime scenes was not recorded in the electronic system.
The UK government is assessing the possible consequences of a "technical error", due to which 150 thousand records were deleted from police databases, including fingerprints of...
The US authorities reported hacking of cloud corporate accounts due to employees ' failure to comply with the requirements of cyber hygiene.
The US Cybersecurity and Infrastructure Security Agency (CISA) has reported a series of successful cyber attacks on a number of cloud services.
According...
MSTR declined by as much as 12.6% on Monday as Bitcoin pulled back sharply from $40,000 levels.
Shares of MicroStrategy (MSTR), a business intelligence firm with considerable exposure to Bitcoin (BTC), declined sharply on Monday as profit-taking ensued following a parabolic rally over the past...
A Kaspersky Lab study claims that the malware used by attackers during a cyberattack on US government agencies in December is similar to tools that are linked to Russian hackers.
Hackers broke into the IT systems of US government agencies using tools used by the Russian cybercrime group Turla...
According to Durov, Apple is more dangerous than Google, because it can completely restrict users ' access to the applications they use.
Telegram founder Pavel Durov said in his blog that Apple may restrict the freedom of users. Therefore, it is better for users to switch from the iOS platform...
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an unknown group of hackers, the press service of the regulator reported on January 10.
image
Unauthorized access to the file-sharing service of the central bank of New Zealand was obtained by an...
The database contains 1.3 million records of registered users.
According to the telegram channel of information leakage, an announcement about the sale of a database containing the data of 1.3 million registered users of the site appeared on the shadow forum hyundai.ru.
According to the...
Due to the" abnormal behavior " of the fingerprint scanner in the Galaxy Note20 series smartphones, the smartphone could be unlocked by any unauthorized person simply by scanning their finger.
image
Manufacturers of modern gadgets are constantly improving the protection of their devices, trying...
United States intelligence agencies believe that the massive hacking attack on federal agencies in December was an attempt to obtain intelligence and "probably originated from Russia."
The Federal Bureau of Investigation( FBI), the US Cybersecurity and Infrastructure Protection Agency (CISA) and...
The problem has been known since at least June 2019, but it still remains uncorrected.
Cloudflare's Web Application Firewall (WAF), used by more than 25 million sites, contains a vulnerability that allows you to bypass the rules and carry out an XSS attack. It is noteworthy that the problem has...
A U.K. judge ruled against extraditing the WikiLeaks founder to the U.S. in response to his legal team arguing he would have a "high risk of serious depression leading to suicide."
Amid speculation on social media that United States President Donald Trump may still pardon Julian Assange before...
The function of checking whether user usernames and passwords were stolen will appear in the Microsoft Edge browser after its update, which is scheduled for release in January.
The browser will constantly check the information with databases of information about declassified usernames and...