Data from thousands of Russian companies have been made publicly available on the web
The data of several hundred Russian companies that used the free online project manager Trello has been made publicly available....
The data of several hundred Russian companies that used the free online project manager Trello has been made publicly available....
In a persistent campaign that features malicious ads on tens of millions, if not hundreds of millions, computers, the criminals...
New England's largest energy provider, Eversource experienced a data breach after sensitive details of customers were exposed on an unsecured...
VulnerableCode is a free and open database of FOSS software package vulnerabilities and the tools to create and keep the...
BuildTo build this project, run the make command from the root folder. Quick BuildTo run quick build for Linux, you...
The importance of carrying out a careful risk and impact assessment in order to safeguard the security of the information...
Cellebrite mobile forensics tool Ufed contains multiple flaws that allow arbitrary code execution on the device, SIGNAL creator warns. Moxie...
Researchers from Human Security have uncovered a huge botnet of Android devices being used to conduct fraud in the connected...
Cybersecurity firm Trend Micro revealed that a threat actor is actively exploiting a flaw, tracked as CVE-2020-24557, in its antivirus solutions...
During an undercover interview, a CyberNews researcher tricked ransomware operators affiliated with Ragnar Locker into revealing their ransom payout structure,...
A WhatsApp malware dubbed WhatsApp Pink is able to automatically reply to victims’ Signal, Telegram, Viber, and Skype messages. A WhatsApp...
Summary: Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie...
Summary: ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to execute arbitrary commands via unspecified vectors. Reference...
Summary: Directory traversal vulnerability in the web server on Honeywell Midas gas detectors before 1.13b3 and Midas Black gas detectors...
Summary: The login function in the RequestController class in Moxa OnCell Central Manager before 2.2 has a hardcoded root password,...
In April 2021, the Spanish retailer Phone House allegedly suffered a ransomware attack that also exposed significant volumes of customer...
Facial recognition tech is in the news again after the FBI discovered the identify of one of the Capitol rioters...
Pulse Secure has alerted customers to the existence of an exploitable chain of attack against its Pulse Connect Secure (PCS)...
Microsoft quietly patched a local privilege escalation (LPE) flaw that affects both Windows 7 and Server 2008 R2 computers. This...
Cybercriminals with apparent ties to North Korea that hit e-commerce shops in 2019 and 2020 to steal payment card data...
The Swedish Prosecutor's Office and the Swedish State Security Service accused Russia's Main Intelligence Directorate of a hacking attack on...
The Serious Organized Crime Threat Assessment study 2021 by Europol summarises the criminal threat from the last four years and...
According to a local security firm, a Chrome exploit published online last week has been weaponized and exploited to target...
If you have read our previous blogpost “Targeted Malware Reverse Engineering Workshop follow-up. Part 1“, you probably know about the...