Malwarebytes research shows an unequal, unsafe Internet
If the Internet was as safe and as private as it is essential for everyday life—increasingly required for job applications,...
If the Internet was as safe and as private as it is essential for everyday life—increasingly required for job applications,...
Up to 15 Russian financial organizations were subjected to a large-scale cyberattack in August and September of this year.The first...
Guardicore Security Researcher, Amit Serper identified a critical vulnerability in Microsoft's autodiscover- the protocol, which permits for the automatic setup...
SonicWall has released a security advisory to warn users regarding a critical flaw impacting some of its Secure Mobile Access...
Investigators within the cybersecurity industry have revealed a unique approach used by a threat actor to purposefully avoid detection using...
There's a new malware, and it's wreaking havoc on Android users. Drinik is a malware that steals vital data and...
Lightweight UNIX backdoor for ethical hacking. Useful for red team engagements and CTFs. Something I wrote a few years ago...
中文版本(Chinese version) About DongTai IASTDongTai IAST is an open-source passive interactive security testing (IAST) product. It uses dynamic hooks and...
Last month, the Port of Houston, one of the major US ports, was hit by a cyber attack allegedly orchestrated...
A cyberespionage campaign hit multiple Russian organizations, including JSC GREC Makeyev, a major defense contractor, exploiting a recently disclosed zero-day....
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Researchers from Google’s TAG team reported that financially motivated actors are using new code signing tricks to evade detection. Researchers...
The customer care and call center provider GSS has suffered a ransomware attack that crippled its systems and impacted its...
Summary: u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2...
Summary: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host...
Summary: ** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by...
Summary: In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements...
Summary: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13....
Summary: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13....
In September 2021, the Thai-based English language teaching website Ajarn discovered they'd been the victim of a data breach dating...
Google researchers have identified malware developers generating malformed code signatures that appear to be valid in Windows to bypass security...
South African retail bank African Bank has confirmed that one of its debt recovery partners, Debt-IN, was targeted by a...
CISA officers on 23rd of September reported about a potential government-backed hacker organization that has tried to break the Port...
According to CyberNews, a database holding the records of about 3.8 billion Clubhouse and Facebook users is being auctioned at...