CVE-2021-21466
Summary: SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200,...
Summary: SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200,...
Summary: FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated). Reference Links(if available): https://github.com/FOGProject/fogproject/issues/422 CVSS Score (if available) v2:...
Liège, the third largest city in Belgium, and a major educational hub, has been hit by a ransomware attack, disrupting...
If you’re in the UK, you’ve likely received a fake delivery SMS at this point. The original big driver for...
Aqua Security announced on Monday that information gathered from container honeypots over a six-month period indicated that 50% of misconfigured...
"There are three most common types of data leakage," said Vseslav Solenik, Director of the R-Vision Center of Expertise.Personal data...
The developers of the Wire secure messaging app have patched the software against two critical security flaws, one of which...
A vulnerability had existed in Google's eponymous Android app with over five billion downloads to date that might have enabled...
The SOA & IdM platform is utilized by NATO and is classified as secret. It was used to conduct various...
Costin Raiu has been with Kaspersky since 2000, initially as the Chief Security Expert overseeing research efforts in the EEMEA...
This project aims to assist in the search for leaked passwords while maintaining a high level of privacy using the...
Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods. I have included...
DirtyMoe is a Windows botnet that is rapidly growing, it passed from 10,000 infected systems in 2020 to more than...
The Tor Project released Tor Browser 10.0.18 that addresses a flaw that allows sites to track users by fingerprinting the...
Boffins developed a tool dubbed DroidMorph that provides morphing of Android applications (APKs) and allows to create Android apps (malware/benign)...
The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more...
Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the importance of...
Remember when we told you to patch your VPNs already? I hate to say “I told you so”, but I...
Earlier this month, Schneider Electric, a global supplier of energy and automation digital solutions published a security advisory for its...
After two months of break, a Middle Eastern advanced persistent-threat (APT) organization has resurfaced and is targeting government institutions in...
Squalr Official Website Join us on our Discord Channel Squalr is performant Memory Editing software that allows users to create...
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps. Using raw RDP...
The US National Security Agency (NSA) released guidance for securing Unified Communications/Voice and Video over IP Systems (VVoIP). NSA last...
The British intelligence agency MI5 seized Boris Johnson ‘s phone over concerns related to the availability of his number online...