33.4% of ICS computers hit by a cyber attack in H2 2020
H2 2020 – Kaspersky observed an increase in ransomware attacks on industrial control system (ICS) systems in developed countries. Cybersecurity...
H2 2020 – Kaspersky observed an increase in ransomware attacks on industrial control system (ICS) systems in developed countries. Cybersecurity...
A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. Microsoft recently...
Summary: There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could...
Summary: An out-of-bounds write vulnerability exists in the TIFF header count-processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed...
Summary: Mozilla developers reported memory safety bugs present in Firefox 86. Some of these bugs showed evidence of memory corruption...
Summary: Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of...
Summary: There is a flaw in OpenEXR in versions before 3.0.0-beta. An attacker who can submit a crafted file to...
Bitcoin is turning into an undeniably well-known payment alternative among numerous organizations. Fast-food chains, large tech organizations, and major beverage...
On Saturday, a user turned to a low-level hacking forum to leak the personal information of hundreds of millions of...
Chinese hackers are infiltrating into residents' house security cameras, shooting them having sex and selling the footage online. However shocking...
Coinopsy.com, an online firm that tracks dead cryptocurrencies has published a data report regarding the number of dead cryptocurrencies or...
In 7 EU countries, Tala assessed the websites of the leading MSPs for the European top mobile providers, data exposure...
Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.Supported VersionsWindows 10 1507,...
Get SharpHoundThe latest build of SharpHound will always be in the BloodHound repository here Compile InstructionsSharpHound is written using C#...
A malware attack against vehicle inspection services provider Applus Technologies paralyzed preventing vehicle inspections in eight US states. Applus Technologies...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Clop ransomware gang leaked online data stolen from Stanford Medicine, University of Maryland Baltimore, and the University of California. Clop...
On April 3, a user has leaked the phone numbers and personal data of 533 million Facebook users in a...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
Summary: A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur...
Summary: The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6...
Summary: This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function. Reference...
In April 2021, a large data set of 533 million Facebook users was made freely available for download. Encompassing approximately...