December 6, 2020 at 08:30AM

■■■□□ #DataLeak: Multinational human resource consulting firm Randstad NV announced that they were a victim of the Egregor ransomware. Screenshot taken from the darknet portal of attackers. https://tools.euroland.com/tools/pressreleases/GetPressRelease/?ID=3845464&lang=en-GB&companycode=NL-RAND&pid=2 https://t.me/cKure/6253

December 6, 2020 at 07:23AM

■□□□□ Cross Site Scripting (XSS) Reflected in one of the subdomains of “General Motors”. https://securitytrooper.com/en/cross-site-scripting-xss-reflected-in-one-of-the-subdomains-of-general-motorsbugbounty https://t.me/cKure/6252

December 5, 2020 at 11:22PM

■■■■□ MARIJUANA, a PHP shell that emerged last year. The author has a GitHub page which promotes a claim that the shell possesses a “stealth” mode, which can be used to bypass website security services like web application firewalls (WAFs). https://blog.sucuri.net/2020/12/obfuscation-techniques-in-marijuana-shell-bypass.html https://t.me/cKure/6250

December 5, 2020 at 08:45PM

■■□□□ #Israel hit again. Iranian Hackers Attack Israeli water facility, gain access to HMI systems. Looks like the country needs major improvements in cyber security aspects. #CyberAttack #CyberWar #Iran https://www.ehackingnews.com/2020/12/iranian-hackers-attack-israel-water.html https://t.me/cKure/6245