SolarWinds hackers had access to components used by Azure, Intune, and Exchange
Microsoft announced that SolarWinds hackers could have had access to repositories containing some components used by Azure, Intune, and Exchange....
Microsoft announced that SolarWinds hackers could have had access to repositories containing some components used by Azure, Intune, and Exchange....
PaloAlto Network warns of the WatchDog botnet that uses exploits to take over Windows and Linux servers and mine cryptocurrency....
Summary: SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated PSD file received from untrusted...
Summary: SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated IFF file received from untrusted...
Summary: Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows for privilege escalation via configd. Reference Links(if available): https://www.tenable.com/security/research/tra-2021-04 CVSS...
Summary: A vulnerability in EbmlTypeDispatcher::send in VideoLAN VLC media player 3.0.11 allows attackers to trigger a heap-based buffer overflow via...
Summary: The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended...
Along with the Pirrit Mac adware identified earlier this week, researchers from Red Canary identified Thursday a different malware strain...
What game caused some players to experience seizures, allows you to have unauthorized sex with Keanu Reeves, features a lead...
In 2020, reported losses to the FTC for romance scams went up by 50% from 2019, totalling $304 million. And...
Members of the Egregor group, which provides the service using the Ransomware-as-a-Service (RaaS) model, have been arrested by the Ukrainian...
 Jones Day, a U.S.-based international law firm has suffered a major ransomware attack, and the allegedly stolen files from Jones...
 An anonymous user offered 14 million data from Amazon and eBay accounts on a prominent hacking website for dissemination. The...
WireBug is a tool set for Voice-over-IP penetration testing. It is designed as a wizard which makes it easy to...
This framework is the end product of my experience in reverse engineering iOS kernelcache,I do manually look for vulnerabilities in...
Modern web apps are two things: complex, and under persistent attack. Any publicly accessible web application can receive up to...
The OpenSSL Project addressed three vulnerabilities, including two denial-of-service (DoS) issues and a bug in the SSLv2 rollback protection. The...
The US DOJ charged three members of the North Korea-linked Lazarus Advanced Persistent Threat (APT) group. The U.S. Justice Department...
Malvertising gang ScamClub has exploited an unpatched zero-day vulnerability in WebKit-based browsers in a campaign aimed at realizing online gift...
Summary: The CGE page with download function contains a Directory Traversal vulnerability. Attackers can use this loophole to download system...
Summary: The CGE property management system contains SQL Injection vulnerabilities. Remote attackers can inject SQL commands into the parameters in...
Summary: The id parameter in detail.php of Online Book Store v1.0 is vulnerable to union-based blind SQL injection, which leads...
Summary: The EFM ipTIME C200 IP Camera is affected by a Command Injection vulnerability in /login.cgi?logout=1 script. To exploit this...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...