CVE-2020-11309
Summary: Use after free in GPU driver while mapping the user memory to GPU memory due to improper check of...
Summary: Use after free in GPU driver while mapping the user memory to GPU memory due to improper check of...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
We’ve been tracking a fraudulent scheme involving renewal notifications for several months now. It came to our attention because the...
GitHub awarded $25,000 to the security researcher, Teddy Katz for discovering a bug and patching it. On March 17, bug...
The Central Bank of Russia has warned of the emergence of a group of hackers investigating vulnerabilities in banks' mobile...
A lot of people are familiar with the US Internal Revenue Service (IRS) scam letters about the tax season that...
I created an Offensive Security Exam Report Template in Markdown so LaTeX, Microsoft Office Word, LibreOffice Writer are no longer...
Kraker is a distributed password brute-force system that allows you to run and manage the hashcat on different servers and...
Independent research firm cites Rapid7 MDR’s “security professionals with extensive incident response and threat hunting experience” delivering a “white-glove, behavioral...
Ata Hakcil led the team of white hat hackers from WizCase in identifying a major data leak on online trading broker FBS’...
Security experts reported that a second ransomware gang, named Black Kingdom, is targeting Microsoft Exchange servers. After the public disclosure...
Hackers have exposed personal and voter registration details of over 6.5 million Israeli voters, less than 24 hours before the...
Microsoft revealed that 92% of all on-premises Microsoft Exchange servers exposed online affected by the ProxyLogon vulnerabilities are now patched....
This week, IoT company Sierra Wireless disclosed a ransomware attack that hit its internal IT systems on March 20 and...
Summary: The unofficial apple/swift-format extension before 1.1.2 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing...
Summary: A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw...
Summary: XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: Lack of authorisation checks in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly restrict...
In January 2021, the lead generation company Astoria Company allegedly suffered a data breach which exposed over 11M unique email...
An IT contractor working for an IT consultancy company took it upon himself to perform an act of revenge against...