DriveSure – 3,675,099 breached accounts
In December 2020, the car dealership service provider DriveSure suffered a data breach. The incident resulted in 26GB of data...
In December 2020, the car dealership service provider DriveSure suffered a data breach. The incident resulted in 26GB of data...
In a recent malware attack over 128 million iOS customers have been targeted. The malware employed by the attackers goes...
The operator of a major gasoline pipeline in the U.S. shut down operations late Friday following a ransomware attack pipeline...
The identities of over 200,000 people who appear to be participating in Amazon fraudulent product review schemes have been exposed...
The most frequently smartphones of the company Samsung are exploded. There are also known cases when Apple products exploded in...
US intelligence agencies have started to study supply chain threats from Russia, a top official within the Justice Department confirmed...
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build...
Accept line-delimited domains on stdin, fetch known URLs from the Wayback Machine for *.domain and output them on stdout. Usage...
‘Spam protection, AntiSpam, FireWall by CleanTalk’ anti-spam WordPress plugin could expose user sensitive data to an unauthenticated attacker. A Time-Based...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A flaw in some DNS resolvers, tracked as TsuNAME, can allow attackers to launch DDoS attacks against authoritative DNS servers....
A cyberattack forced the shutdown of one of the largest pipelines in the United States, the Colonial Pipeline facility in...
Summary: A vulnerability in the SIP inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense...
Summary: A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense...
Summary: An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization,...
Summary: This affects all versions of package github.com/russellhaering/gosaml2. There is a crash on nil-pointer dereference caused by sending malformed XML...
A ransomware attack hit U.S defense contractor Blueforce, says Hatching Triage sample, and a Conti ransomware chat. Ransomware in the...
According to a recent article, the Chinese government used an award-winning iPhone hack first uncovered three years ago at a...
According to the cybersecurity researchers, several fresh techniques, comparatively advanced — are being used by attackers, for exploiting legitimate Windows...
To say that Bengaluru’s epidemic is huge is an understatement. Bengaluru has more than 65 percent of all active cases...
Security researchers have found extreme domain name system (DNS) fixes that hackers may use to conduct constructive denial-of-service attacks on...
For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective...
Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/). Audit your EC2 instance to find security misconfigurations using...
Microsoft is warning of a large-scale BEC campaign that targeted hundreds of organizations leveraging typo-squatted domains registered days before the...