![]() |
Description: GoSearch: A Powerful OSINT Tool for Tracking Digital Footprints and Leaked Passwords Across Social Networks
January 1st, 2025 (6 months ago)
|
![]() |
Description: HIMARS DDOS Targeted the Website of GTO
January 1st, 2025 (6 months ago)
|
![]() |
Description: Ddarknotevil Claims to have Leaked the Data of Huila Chamber of Commerce
January 1st, 2025 (6 months ago)
|
![]() |
Description: State Child Protection Society Has Been Claimed a Victim to Funksec Ransomware
January 1st, 2025 (6 months ago)
|
![]() |
Description: A Threat Actor Claims to be Selling the Data of ASISA
January 1st, 2025 (6 months ago)
|
![]() |
A Threat Actor Claims to have Leaked the Data of an Unidentified Maritime Industry Company in the US
Description: A Threat Actor Claims to have Leaked the Data of an Unidentified Maritime Industry Company in the US
January 1st, 2025 (6 months ago)
|
![]() |
Description: A Threat Actor Claims to be Selling the Data of Carruth Compliance Consulting, Inc
January 1st, 2025 (6 months ago)
|
![]() |
Description: IntelBroker and EnergyWeaponUser Allegedly Leaked the Source Code of Ministry of Environment
January 1st, 2025 (6 months ago)
|
![]() |
Description: A Threat Actor is Allegedly Selling Access to an Unidentified Canadian Retail Corp
January 1st, 2025 (6 months ago)
|
![]() |
Description: Threat hunters have disclosed a new "widespread timing-based vulnerability class" that leverages a double-click sequence to facilitate clickjacking attacks and account takeovers in almost all major websites.
The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo.
"Instead of relying on a single click, it takes advantage of a double-click sequence," Yibelo said.
January 1st, 2025 (6 months ago)
|