Clop ransomware is back into action after the recent police operation
A week after the law enforcement operation that targeted the Clop ransomware operators, the gang is back into action. A...
A week after the law enforcement operation that targeted the Clop ransomware operators, the gang is back into action. A...
Palo Alto Networks addresses a critical improper authorization vulnerability (CVE-2021-3044) affecting its Cortex XSOAR security orchestration solution, automation and response...
A critical vulnerability, tracked as CVE-2021-20019, in SonicWall VPN appliances was only partially patched last year and could allow a remote...
D3FEND is a new project promoted by MITRE Corporation to add defensive cybersecurity techniques to the ATT&CK Framework. D3FEND is...
DarkRadiation is a new strain of ransomware implemented in Bash that targets Linux and Docker cloud containers and leverages Telegram...
Summary: A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be...
Summary: An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in...
Summary: Successful exploitation of this vulnerability could give an authenticated Metasys user an unintended level of access to the server...
Summary: SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200,...
Summary: SAP Business Warehouse, versions 700, 701, 702, 711, 730, 731, 740, 750, 782 and SAP BW/4HANA, versions 100, 200,...
Summary: FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated). Reference Links(if available): https://github.com/FOGProject/fogproject/issues/422 CVSS Score (if available) v2:...
Liège, the third largest city in Belgium, and a major educational hub, has been hit by a ransomware attack, disrupting...
If you’re in the UK, you’ve likely received a fake delivery SMS at this point. The original big driver for...
 Aqua Security announced on Monday that information gathered from container honeypots over a six-month period indicated that 50% of misconfigured...
"There are three most common types of data leakage," said Vseslav Solenik, Director of the R-Vision Center of Expertise.Personal data...
 The developers of the Wire secure messaging app have patched the software against two critical security flaws, one of which...
 A vulnerability had existed in Google's eponymous Android app with over five billion downloads to date that might have enabled...
 The SOA & IdM platform is utilized by NATO and is classified as secret. It was used to conduct various...
Costin Raiu has been with Kaspersky since 2000, initially as the Chief Security Expert overseeing research efforts in the EEMEA...
This project aims to assist in the search for leaked passwords while maintaining a high level of privacy using the...
Unit tests for blue teams to aid with building detections for some common macOS post exploitation methods. I have included...
DirtyMoe is a Windows botnet that is rapidly growing, it passed from 10,000 infected systems in 2020 to more than...
The Tor Project released Tor Browser 10.0.18 that addresses a flaw that allows sites to track users by fingerprinting the...
Boffins developed a tool dubbed DroidMorph that provides morphing of Android applications (APKs) and allows to create Android apps (malware/benign)...