Poland: The leader of the PiS party blames Russia for the recent attack
Jaroslaw Kaczynski, the leader of the Poland Law and Justice party, blames Russia for the recent cyberattack targeting top Polish politicians. Jaroslaw...
Jaroslaw Kaczynski, the leader of the Poland Law and Justice party, blames Russia for the recent cyberattack targeting top Polish politicians. Jaroslaw...
Summary: ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows ntpkeygen to generate keys with '#' characters....
Summary: An improper free of uninitialized memory can occur in DIAG services in Snapdragon Compute, Snapdragon Industrial IOT, Snapdragon Mobile...
Summary: Receipt of a specific MPLS packet may cause the routing protocol daemon (RPD) process to crash and restart or...
Summary: A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on...
Summary: A vulnerability in Cisco Webex Player for Windows and MacOS could allow an attacker to execute arbitrary code on...
Summary: Key exchange without entity authentication in the Intel(R) Security Library before version 3.3 may allow an authenticated user to...
Last week on Malwarebytes Labs: How to delete your Instagram account.Working from home? You’re probably being spied on.Another one bites...
Ransomware attacks are on a different scale this year, with major attacks not just dismantling the business and management of...
Volkswagen announced that a massive data breach exposed the personal information of over 3.3 million customers after one of its...
In the recent analysis, experts discovered that the digital credit card skimming ecosystem evolves as experts identify new players, tooling,...
Experts analyzed how often children encounter cyber incidents in the online space. It turned out that every fifth child has...
Recorded Future, a US security firm, revealed a cyber espionage campaign linked to a suspected Chinese state-sponsored threat activity group,...
The Russian government wants to create a single video surveillance system that will unite smart cameras in Russian cities. The...
This project is a PoC code to use Pass-the-Hash for authentication on a local Named Pipe user Impersonation. There also...
A tool for simplifying the process of researching file hashes, IP addresses, and other indicators of compromise (IOCs). FeaturesLook up...
Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s IT network....
A new bug in iPhone can permanently break users’ WiFi by disabling it, the issue could be triggered by simply...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Summary: A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM...
Summary: A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM...
Summary: SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash. Reference Links(if available): https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13...
Summary: A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch->bv_len miscalculation and slapd crash in the saslAuthzTo...
Summary: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources,...