The black parasite. We study the work of the Venom warrior
The black parasite. We study the work of the Venom warrior
⚡TV network merged the database of one of the services mail.ru .
In total, analysts have identified 3,505,916 records that contain:
Experts from Palo Alto Networks have recorded a surge in cyber attacks aimed at the RCE vulnerability in the Realtek Jungle SDK.
We are talking about the error CVE-2021-35394, which was made public back in August 2021.
VMware has released fixes to address vRealize Log Insight vulnerabilities that could allow attackers to get remote code execution on uncorrected devices.
vRealize Log Insight (VMware Aria Operations for Logs) is a tool for analyzing and managing infrastructure and application logs in VMware environments.
Hackers from TurkHackTeam claimed responsibility for a cyber attack on the website of the Swedish parliament in protest against the burning of the Koran, demanding an apology. Judging by the tweets, hackers are attacking everything in a row: telecom, banks, online medical journal sites and the subway.
In recent years, the use of Cobalt Strike and Metasploit as tools for attacks on various types of systems has become very popular among attackers.
However, using these tools, security tools have learned to detect and stop attacks based on the information collected. In order to avoid detection of EDR and various antivirus solutions, hackers had to try other options.
Tacito Security researchers have released a PoC exploit for a vulnerability called iTLB multihit.
The error affects a fairly wide range of Intel processors and is associated with the associative translation buffer (TLB), a specialized CPU cache used to accelerate the translation of virtual memory addresses to physical memory addresses.
Secret documents of the Taiwan National Security Bureau (NSB) can be purchased on breached for $150,000.
Taiwan's main intelligence agency is investigating a possible leak, but so far has not confirmed the authenticity of the documents appearing on the darknet.
Apple has released fixes to address numerous serious security vulnerabilities for the flagship iOS and macOS platforms.
The most serious of the documented vulnerabilities affect WebKit and can expose iOS and macOS devices to code execution attacks through malicious web content.
The Canadian distributor of alcoholic beverages Liquor Control Board of Ontario (LCBO) was attacked by Magecart, which led to the compromise of personal data of users.
LCBO is one of the largest sellers of alcoholic beverages in Canada and sells alcoholic beverages throughout the province of Ontario, operating more than 670 stores with a total staff of almost 8000 people.
How to recognize blurry text in images?
Quite often on the Internet in screenshots or videos we find personal information or text that is hidden with the help of a blur effect. Thus, the text cannot be read with the help of a human eye, but a special neural network called Unredacter can do this.
How to set passwords in the form of emojis?
We present you a rather interesting extension called Identiji → TYK ←. It allows you to create passwords in the form of emojis, which, in turn, is designed to make life easier for those who constantly forget passwords and do not like to use standard passwords.
Changing your voice 💻
People often change their voice on audio recordings — to preserve anonymity or just to make fun of friends. For example, to say something frightening in the voice of a monster.
Free calls and a virtual number.
Good day, in this post I want to share with you a very useful program for creating a virtual number, it can be useful in many situations, save it so as not to lose it.
Total punching of a person by photo
Today I would like to share with you an excellent service that allows you to find out all the information about photography. At the same time, processing photos to find out the information of interest is not all that this resource can boast of. It's called Start Me.