Twitch data breach updates: login credentials or card numbers not exposed
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent...
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent...
Google’s announced some changes to how it’s helping millions of its users stay safe and secure. The biggest of those...
Operation GhostShell: Threat actors used ShellClient malware in cyberespionage campaigns aimed at companies in the aerospace and telecommunications sectors. Hackers...
Resecurity researchers dumped Gigabytes of data from Agent Tesla C2Cs, one of the most well-known cyberespionage tools suffers a data...
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent...
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions and generate rapport.Preview front...
Online safety is hard enough for most adults. We reuse weak passwords, we click on suspicious links, and we love...
The Apache HTTP Server 2.4.49 is vulnerable to a flaw that allows attackers to use a path traversal attack to...
Summary: XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary...
Summary: A heap-based buffer overflow could occur while parsing PICT or TIFF files in Autodesk 2018, 2017, 2013, 2012, 2011....
Summary: A maliciously crafted TIFF, PDF, PICT or DWF files in Autodesk 2018, 2017, 2013, 2012, 2011 can be forced...
Summary: A maliciously crafted PDF, PICT or TIFF file can be used to write beyond the allocated buffer while parsing...
Summary: Dr.Web Firewall 12.5.2.4160 on Windows incorrectly restricts applications signed by Dr.Web. A DLL for a custom payload within a...
Summary: Dr.Web Firewall 12.5.2.4160 on Windows incorrectly restricts applications signed by Dr.Web. A DLL for a custom payload within a...
The governor of Arizona, Doug Ducey, has announced the launch of a Cyber Command Center to address the thousands of...
Big, breaking news going around at the moment. If you have a Twitch account, you may wish to perform some...
In September 2021, the Republican Party of Texas was hacked by a group claiming to be "Anonymous" in retaliation for...
VERSION 3.6Code efficiency enhancements and bug fixes for plugins, and improved logging.Significant UI/UX enhancements.Organisation specific settings and configurations, allowing for...
The UK media outlet The Telegraph has leaked 10 TB of subscriber data after failing to properly secure one of...
Boffins devised a new technique, dubbed LANtenna, to exfiltrate data from systems in air-gapped networks using Ethernet cables as a...
pFuzz is an advanced red teaming fuzzing tool which we developed for our research. It helps us to bypass web...
Apache has addressed two vulnerabilities, one of which is a path traversal and file disclosure flaw in its HTTP server...
An unnamed ransomware gang used a custom Python script to target VMware ESXi and encrypt all the virtual machines hosted...
Mark Zuckerberg was left counting the personal cost of bad PR yesterday (about $6 billion, according to Bloomberg) on a...