Pwn2Own 2021: participants earned $1,2M of the $1.5M prize pool
The Pwn2Own 2021 hacking competition was concluded, participants earned more than $1.2 million, the greatest total payout ever. The Pwn2Own...
The Pwn2Own 2021 hacking competition was concluded, participants earned more than $1.2 million, the greatest total payout ever. The Pwn2Own...
CISA released a Splunk-based dashboard for post-compromise activity in Microsoft Azure Active Directory (AD), Office 365, and MS 365 environments. The Cybersecurity...
A threat actor has sold almost 900,000 gift cards and over 300,000 payment cards on a cybercrime forum on the...
Wizcase experts discovered a security flaw in the open-source learning platform Moodle that could allow accounts takeover. At the beginning...
Summary: Multiple issues were addressed with improved logic. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001...
Summary: CA eHealth 6.2.x and 6.3.x before 6.3.2.13 allows remote authenticated users to cause a denial of service or possibly...
Summary: ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service....
Summary: The Database Backups WordPress plugin through 1.2.2.6 does not have CSRF checks, allowing attackers to make a logged in...
Summary: The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection,...
Two Dutch white-hat security specialists entered the annual computer hacking contest Pwn2Own, managed to find a Remote Code Execution (RCE)...
Ransomware operators shut down two production facilities having a place with a European manufacturer in the wake of conveying a...
The classic scheme to defraud Russian bank clients with the help of malicious emails is experiencing a second birth. Now...
Two IT universities of Ireland the National College of Ireland (NCI) and the Technological University of Dublin have been hit...
Gigaset, a German device maker, was recently hit with a supply chain attack, the hackers breached a minimum of one...
Security researchers have noted an increase in the misuse of legitimate services such as Google Forms and Telegram for gathering...
Maximizing BloodHound.DescriptionNew Release: dpat - The BloodHound Domain Password Audit Tool (DPAT) A simple suite of tools: get-info - Pull...
NtHiM - Super Fast Sub-domain Takeover DetectionInstallationMethod 1: Using Pre-compiled BinariesThe pre-compiled binaries for different systems are available in the...
The following blog was co-authored by Caitlin Condon and Bob Rudis, also known (in his own words) as “some caveman...
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
This blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1The DivvyCloud by Rapid7 team has had...
Group-IB, a global threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Swarmshop card shop have been leaked...
Pwn2Own 2021 – Day 2: a security duo earned $200,000 for a zero-interaction Zoom exploit allowing remote code execution. One...
Days after a massive Facebook data leak made the headlines, 500 million LinkedIn users are being sold online, seller leaked 2 million...
Cisco has addressed a critical pre-authentication remote code execution (RCE) vulnerability in the SD-WAN vManage Software. Cisco has addressed multiple...