Marketo Marketplace – Cybercriminals are targeting major law firms
Cybercriminals published for sale in Dark Web 58GB of data stolen from Hollingsworth LLP. One of the emerging underground marketplaces...
Cybercriminals published for sale in Dark Web 58GB of data stolen from Hollingsworth LLP. One of the emerging underground marketplaces...
Threat actors are wiping many Western Digital (WD) My Book Live and My Book Live Duo NAS devices likely exploiting...
Summary: ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows ntpkeygen to generate keys with '#' characters....
Summary: ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such...
Summary: PHPMailer before 6.5.0 on Windows allows remote code execution if lang_path is untrusted data and has a UNC pathname....
Summary: PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is...
Summary: An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks...
Hackers appeared to be taking advantage of a vulnerability first published in 2019. Western Digital stopped supporting My Live drives...
According to the Russian Foreign Ministry, the words of White House spokesman Jen Psaki that the United States does not...
Earlier this year in January 2021, Cloud security researchers from Wiz.io accidentally uncovered a ‘novel’ class of Domain Name Service...
The renowned Cl0p ransomware operation appears to be back in business, just days after Ukrainian police arrested six alleged members...
The banking trojan 'Ursnif' (aka 'Gozi') is back in business in Italy, targeting a large range of banking users with...
An opensource tool for scanning Azure blob storage accounts for publicly opened blobs. BlobHunter is a part of "Hunting Azure...
RomBuster is a router exploitation tool that allows to disclosure network router admin password. FeaturesExploits vulnerabilities in most popular routers...
Fortinet has recently fixed a high-severity vulnerability affecting its FortiWeb web application firewall (WAF) that can be exploited by remote...
The Clop ransomware members that were recently arrested laundered over $500M in ransomware payments for several malicious actors. The members of...
Flaws affecting the BIOSConnect feature of Dell Client BIOS could be exploited by a privileged attacker to execute arbitrary code...
Summary: Mozilla developers reported memory safety bugs present in Firefox 88. Some of these bugs showed evidence of memory corruption...
Summary: Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11. Some of these bugs showed...
Summary: In rw_i93_send_to_lower of rw_i93.cc, there is a possible out of bounds write due to a missing bounds check. This...
Summary: Accellion Kiteworks before 7.4.0 allows an authenticated user to perform SQL Injection via LDAPGroup Search. Reference Links(if available): https://github.com/accellion/CVEs...
Summary: XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In versions...
In April 2020, the custom printed apparel website Teespring suffered a data breach that exposed 8.2 million customer records. The...
In June 2020, the Mexican lending platform yotepresto.com suffered a data breach. Over 1.4 million customers were impacted by the...