Digital Concentration Camp: Tech giants are playing God
Recent events in the United States have shown that the tech giants do not care about the constitution, this is...
Recent events in the United States have shown that the tech giants do not care about the constitution, this is...
David Schutz, a security researcher uncovered the potential unauthorized access to a user’s viewing history, favorites, and playlists by the...
Computer gaming giant that goes by the motto of “level up experience more”, Nvidia detected bugs in its Shield TV....
In yet another data breach, sensitive information of almost 3.25 lakh clients of India-based global cryptocurrency exchange and wallet, BuyUcoin,...
sigurlx a web application attack surface mapping tool, it does ...: Categorize URLs URLs' categories: > endpoint > js {js}...
Search For Documents In A Domain Through Google. The Objective Is To Extract Metadata.Installing dependencies:> git clone https://github.com/Josue87/MetaFinder.git> cd MetaFinder>...
A threat actor was offering for sale on a hacker forum data from 2 million users allegedly stolen from the...
Threat actors are abusing Windows Remote Desktop Protocol (RDP) servers to amplify Distributed Denial of Service (DDoS) attacks. Attackers are...
Drupal development team released security updates to address a vulnerability that resides in the PEAR Archive_Tar third-party library. The Drupal...
QNAP is warning customers of a new piece of malware dubbed Dovecat that is targeting NAS devices to mine cryptocurrency....
Bad ops of operators of a phishing campaign exposed credentials stolen in attacks and made them publicly available through Google...
Summary: IBM Planning Analytics 2.0 could allow a remote attacker to obtain sensitive information, caused by the lack of server...
Summary: protobuf allows remote authenticated attackers to cause a heap-based buffer overflow. Reference Links(if available): https://github.com/google/protobuf/issues/760 https://bugzilla.redhat.com/show_bug.cgi?id=1256426 http://www.openwall.com/lists/oss-security/2015/08/27/2 https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E...
Summary: SDL (Simple DirectMedia Layer) through 2.0.12 has a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP...
Summary: SDL (Simple DirectMedia Layer) through 2.0.12 has an Integer Overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c...
Summary: An issue has been discovered in GitLab affecting all versions starting from 12.1. Incorrect headers in specific project page...
The research team at JSOF found seven vulnerabilities in dnsmasq and have dubbed them DNSpooq, collectively. Now, some of you...
The WhatsApp messenger, which is owned by Facebook, began to notify its users (which is about 2 billion) about the...
Threat actors utilized Google Duo, Facebook Messenger, Signal, JioChat, and Mocha messaging apps vulnerabilities to their advantage by listening to...
For the last few years, a Chinese threat group under the name Chimera has been targeting the airline industry with...
New research by New Zealand organization Emsisoft has discovered that a cyber-blackmail tactic initially debuted by ransomware gang MAZE has...
WordPress user enumeration and login Brute Force tool for Windows and Linux With the Brute Force tool, you can control...
CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency....
It goes without saying that the 117th US Congress has a lot to get done and many legitimate priorities are...