CVE-2021-33503
Summary: An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the...
Summary: An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the...
In January 2021, the now defunct Iranian social media platform Raychat suffered a data breach that exposed 939 thousand unique...
Kaspersky said that the most professional, most aggressive espionage attacks are carried out by those who speak English, Russian and...
The second wave of deadly COVID-19 has left many countries’ economies in ruins, especially developing countries are undergoing a tough...
The Indian government seems to be gearing up in the wake of the growing threat of cyber-attacks against the Indian...
Currently, the US is the leading cyberspace power, but China is also closing in quickly and will be a tough...
Increasing safety measures led attackers to explore different ways to breach systems. The increasing number of firewall and ransomware attacks...
MacHound is an extension to the Bloodhound audting tool allowing collecting and ingesting of Active Directory relationships on MacOS hosts....
Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's People API....
Wizard Spider, the cybercrime gang behind the TrickBot botnet, is believed to be the author of a new ransomware family dubbed...
Microsoft is urging Azure users to update PowerShell to address a remote code execution vulnerability that was fixed earlier this...
Summary: Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue...
Summary: In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization...
Summary: When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file,...
Summary: libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames...
Summary: Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary...
A severe ransomware attack reportedly taking place now against the popular Remote Monitoring and Management software tool Kaseya VSA has...
The NSA, FBI, and CISA, in cooperation with the UK’s National Cyber Security Centre (NCSC), have issued a report that...
Although many cyberattacks made major headlines in the US this year, most of the customers are still not aware of...
Threat actors have breached a server belonging to MonPass, a major certification authority (CA) in Mongolia in East Asia, and...
One of the UK's leading cyber officials has cautioned of a rising threat to Ireland's cross-border telecoms, energy, and transportation...
Recently, a massive cyberattack took place while Russian president Vladimir Putin was answering citizen queries through the state-broadcast Rossiya 24...
Experts of the cybersecurity company Group-IB note that fraudsters skillfully disguise fake payment pages: they often contain logos of the...
Gorsair is a penetration testing tool for discovering and remotely accessing Docker APIs from vulnerable Docker containers. Once it has...