CVE-2021-30860
Summary: An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS...
Summary: An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS...
Summary: An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS...
Summary: An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS...
Summary: A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request...
Summary: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host...
Summary: An integer overflow exists in HAProxy 2.0 through 2.5 in htx_add_header that can be exploited to perform an HTTP...
For years, people have accused social media, and particularly image-driven sites like Instagram, of being bad for young people, particularly...
In a joint advisory the FBI, the United States Coast Guard Cyber Command (CGCYBER), and the Cybersecurity and Infrastructure Security...
 On Tuesday, Randy Westergren, a cybersecurity expert, published his study on the Motorola Halo+, a popular baby monitor. He revealed...
 Lenovo stated that two legacy IBM System x server models that were discontinued in 2019 are vulnerable to attack and...
 One of the most prominent hacktivists gangs, Anonymous, has returned. Security analysts have verified that the most recent attack by...
 A cyber-attack that had been sitting on the target organization's network for years stealing data was discovered during a McAfee...
Summary Last week, Microsoft reported the remote code execution vulnerability CVE-2021-40444 in the MSHTML browser engine. According to the company,...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
A tool for generating multiple types of NTLMv2 hash theft files. ntlm_theft is an Open Source Python3 Tool that generates...
▒█████ ███▄ █ ▄▄▄█████▓ ██░ ██ ▓█████ █████ ██▓ ▓██ ██▓▒██▒ ██▒ ██ ▀█ █ ▓ ██▒ ▓▒▒▓██░ ██ ▓█...
A spokesman for the authority running Germany’s September 26 general election confirmed that hackers briefly disrupted its website last month....
A new malware written in Golang programming language, tracked as Capoae, is targeting WordPress installs and Linux systems. Akamai researchers...
Security researchers spotted a new malware that uses Windows Subsystem for Linux (WSL) to evade detection in attacks against Windows...
The FBI, CISA, and the Coast Guard Cyber Command (CGCYBER) warn of state-sponsored attacks that are actively exploiting CVE-2021-40539 Zoho...
Microsoft revealed that multiple threat actors are exploiting the recently patched Windows MSHTML remote code execution security flaw (CVE-2021-40444). Microsoft...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
Summary: The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval,...