CVE-2019-15544
Summary: An issue was discovered in the protobuf crate before 2.6.0 for Rust. Attackers can exhaust all memory via Vec::reserve...
Summary: An issue was discovered in the protobuf crate before 2.6.0 for Rust. Attackers can exhaust all memory via Vec::reserve...
Summary: CVE-2021-33909 is an out-of-bounds write vulnerability impacting Linux kernel before version 5.13.4. An exploit was observed in open source...
The Microsoft 365 Defender Threat Intelligence Team posted an article stating that they have been tracking a widespread credential phishing...
Labor Day weekend is just around the corner and, believe it or not, cybercriminals are likely just as excited as you are! ...
DeviceLock, a Russian manufacturer of anti-data leakage systems, reported that the number of complaints about attempts to hack accounts on...
Researchers at Trend Micro, have identified and flagged nearly 14 million Linux-based systems that are directly exposed to the internet,...
According to an apparent email leak, the United Launch Alliance, a major SpaceX competitor, was planning to promote conspiracy stories...
The personal data and clinical information of roughly 73,500 patients of a private eye clinic were hit by a ransomware...
The Chinese developers of famous Android gaming applications exposed user information via an unprotected server. As per the report shared...
AvosLocker Ransomware SummaryVictim Name: Artas Holding / Artas InsaatWe've locked Artas Insaat's network and 3 of their subsidiary companies. Data...
AvosLocker Ransomware SummaryVictim Name: Home in BrusselsDescription "Home in Brussels" offers the best value for money according to each specific...
AvosLocker Ransomware SummaryVictim Name: On logistics Services Algeciras, S.LOn logistics Services Algeciras, S.L. is a company with offices on both...
A CTF web challenge about making screenshots. It is inspired by a bug found in real life. The challenge was...
Tags: API Documentation, Access, Active Directory, Analysis, Binary, LDAP, Linux, Max, Memory, Parameter, Reverse, Takeover, Windows, pwned, Adalancheadalanche - Active...
The Federal Bureau of Investigation (FBI) published a flash alert related to the operations of the Hive ransomware gang. The...
Ragnarok ransomware operators are ceasing their operations and released the master key that can allow their victims to decrypt files...
Researchers disclosed five vulnerabilities in B. Braun ‘s Infusomat Space Large Volume Pump and SpaceStation that could be remotely hacked....
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released five malware analysis reports (MARs) related to samples found on compromised...
Cisco addressed a critical security vulnerability in the Application Policy Infrastructure Controller (APIC) interface used in its Nexus 9000 Series...
Software firm Kaseya addressed Kaseya Unitrends zero-day vulnerabilities that were reported by security researchers at the Dutch Institute for Vulnerability...
Summary: A vulnerability in the vDaemon process of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to cause a...
Summary: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R08/16/32/120SFCPU all...
Summary: Missing synchronization vulnerability in GOT2000 series GT27 model communication driver versions 01.19.000 through 01.39.010, GT25 model communication driver versions...
Summary: Due to a bug with management of handles in OVRServiceLauncher.exe, an attacker could expose a privileged process handle to...