CVE-2021-33503
Summary: An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the...
Summary: An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the...
Summary: A vulnerability in the JsonMapObjectReaderWriter of Apache CXF allows an attacker to submit malformed JSON to a web service,...
US-based global insurance brokerage and risk management firm, Arthur J. Gallagher (AJG) has reported a cyberattack on the company’s infrastructure....
Salesken.ai, an Indian-based technology secured a compromised server that was leaking out private and sensitive data on one of its...
Ahead of the US Independence Day weekend, a ransomware attack crippled the networks of at least 200 American companies on...
Although they are declaring their retirement from the firm, the Babuk ransomware operators seem to have reverted into old habits...
The unidentified hackers attacked the website of MonPass, one of Mongolia's leading certificate authorities, to backdoor its installation software with...
Scour is a modern module based AWS exploitation framework written in golang, designed for red team testing and blue team...
Featuressupport fuzzy search broken header dex. fix struct data of dex-header. compatible with all android version(frida supported). support loading as...
Threat actors compromised the servers of Mongolian certificate authority (CA) MonPass and used its website to spread malware. Hackers compromised...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Swedish supermarket chain Coop is the first company to disclose the impact of the recent supply chain ransomware attack that...
A supply attack by REvil ransomware operators against Kaseya VSA impacted multiple managed service providers (MSPs) and their clients. A...
Summary: Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary...
Summary: HDFS clients interact with a servlet on the DataNode to browse the HDFS namespace. The NameNode is provided as...
Summary: In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce request which bypasses...
Summary: Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes...
Summary: An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the...
In January 2021, the now defunct Iranian social media platform Raychat suffered a data breach that exposed 939 thousand unique...
Kaspersky said that the most professional, most aggressive espionage attacks are carried out by those who speak English, Russian and...
The second wave of deadly COVID-19 has left many countries’ economies in ruins, especially developing countries are undergoing a tough...
The Indian government seems to be gearing up in the wake of the growing threat of cyber-attacks against the Indian...
Currently, the US is the leading cyberspace power, but China is also closing in quickly and will be a tough...
Increasing safety measures led attackers to explore different ways to breach systems. The increasing number of firewall and ransomware attacks...