Threat actors exploit a flaw in Coinbase 2FA to steal user funds
Threat actors stole funds from the accounts of more than 6,000 users of the crypto exchange Coinbase exploiting a flaw...
Threat actors stole funds from the accounts of more than 6,000 users of the crypto exchange Coinbase exploiting a flaw...
The Flubot Android malware is now leveraging fake security updates warning to trick users into installing the malicious code. Threat...
Summary: sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental...
Summary: An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function sbr_qmf_analysis_32 located in sbr_qmf.c. It...
Summary: An issue was discovered in faad2 through 2.10.0. A heap-buffer-overflow exists in the function sbr_qmf_synthesis_64 located in sbr_qmf.c. It...
Summary: An issue was discovered in faad2 through 2.10.0. A stack-buffer-overflow exists in the function ftypin located in mp4read.c. It...
Summary: In Plib through 1.85, there is an integer overflow vulnerability that could result in arbitrary code execution. The vulnerability...
kekeo is a little toolbox I have started to manipulate Microsoft Kerberos in C (and for fun) ASN.1 libraryIn kekeo,...
Telecom Italia Red Team Research (RTR) laboratory led by Massimiliano Brolli reported three new flaws in Oracle GlassFish and Nokia...
 The mis-implementation of Elastic Stack, a collection of open-source products that employ APIs for crucial data aggregation, search, and analytics...
pwncat is a post-exploitation platform for Linux targets. It started out as a wrapper around basic bind and reverse shells...
A baby allegedly received inadequate childbirth health care, and later died, at an Alabama Springhill Medical Center due to a...
Experts believe that the arrest of Ilya Sachkov, the founder and CEO of Group-IB, will not affect the company's work,...
The Federal Communications Commission (FCC) is going to set new rules to curb the rising threat of SIM swapping, also...
 In the past few years, two-factor verification is one of the simplest ways for users to safeguard their accounts. It...
Experts warn of a new Hydra banking trojan campaign targeting European e-banking platform users, including the customers of Commerzbank. Â ...
Researchers have shown that it is possible for attackers to bypass an Apple iPhone’s lock screen to access payment services...
 Kaspersky security researchers have unearthed a new backdoor likely designed by the Nobelium advanced persistent threat (APT) behind last year's...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Summary: A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free...
Luxury retail company Neiman Marcus Group has announced this week that it has suffered a data breach that impacted customer...