GeniusU – 1,301,460 breached accounts
In November 2020, a collection of data breaches were made public including the "Entrepreneur Success Platform", GeniusU. Dating back to...
In November 2020, a collection of data breaches were made public including the "Entrepreneur Success Platform", GeniusU. Dating back to...
The Russian-language Darknet site sells a program that allows you to distribute spam messages bypassing traffic and email protection tools....
Mozilla Firefox is about to disable the browser's backspace key to help users avoid data loss. In 2014, Google Chrome and...
Nissan's source code got compromised online after the company left an uncovered Git server secured with default access credentials. This...
British Airlines broke through the mainstream media with a data breach that affected almost 400,00 customers. This incident happened in...
Hackers have profited a lot from the Covid-19 pandemic by targeting health institutions, let us look back and learn from...
Credential Dumping Tool for SolarWinds Orion Blog post: https://malicious.link/post/2020/solarflare-release-password-dumper-for-solarwinds-orion/Credit to @asolino, @gentilkiwi, and @skelsec for helping me figuring out DPAPI....
A python script which allows you to parse GeoLocation data from your Image files stored in a dataset.It also produces...
A misconfigured Git server is the root cause for the leak of source code of mobile apps and internal tools...
Multiple threat actors have recently started using the Ezuri memory loader as a loader to executes malware directly into the...
The US Federal Bureau of Investigation (FBI) issued a security alert warning private sector companies of Egregor ransomware attacks. The...
The Ryuk ransomware had a disruptive impact on multiple industries around the world, operators already earned more than $150 million....
Experts spotted the RokRat Trojan being used by North Korea-linked threat actors in attacks aimed at the South Korean government....
Summary: Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyCheckLicence race condition that can...
Summary: Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyPreviewAction race condition that can...
Summary: Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyDoAction race condition that can...
Summary: A flaw was found in openjpeg's src/lib/openjp2/t2.c in versions prior to 2.4.0. This flaw allows an attacker to provide...
Summary: Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyCPDFAction race condition that can...
Summary: An issue was discovered in Viki Vera 4.9.1.26180. A user without access to a project could download or upload...
Summary: Foxit Reader before 9.5, and PhantomPDF before 8.3.10 and 9.x before 9.5, has a proxyDoAction race condition that can...
Summary: IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5_2, 6.0.0.0 through 6.0.3.2, and 6.1.0.0 could allow an authenticated user...
Summary: Dell Wyse ThinOS 8.6 and prior versions contain an insecure default configuration vulnerability. A remote unauthenticated attacker could potentially...
Summary: An issue was discovered in Viki Vera 4.9.1.26180. A user without access to a project could download or upload...
In a new phishing campaign, the offending emails arrive in inboxes with attached, password-protected zip archives containing Word documents. (Photo...