NFTs explained: daylight robbery on the blockchain
Did you hear about the JPG file that sold for $69 million? I’ll give you some more detail, the JPG...
Did you hear about the JPG file that sold for $69 million? I’ll give you some more detail, the JPG...
On February 9, after discovering a compromise, CD Projekt Red (CDPR) announced to its 1+ million followers on Twitter that...
Smishing is a cyber assault that utilizes SMS text messages to delude its victims into giving sensitive data to a...
U.S. authorities found no evidence that hackers affiliated with foreign governments were able to block voters from voting, alter votes,...
The customers of State Bank of India (SBI), ICICI, HDFC, Axis Bank, and Punjab National Bank (PNB) have been alerted...
Microsoft has recognized a new change to an authentication system as a potential reason for a blackout that scourged clients...
A Bengaluru-based 38-year-old professor new to the cryptocurrency world lost Rs 10 lakh in bitcoins to a scammer, who assured...
Introduction Traditionally, most malicious objects detected on the macOS platform are adware: besides the already familiar Shlayer family, the TOP...
An Encrypted File transfer via AES-256-CBC AnonX is an encrypted file uploader and downloader. The uploaded archive lasts for one...
Elasticsearch infections are rising exponentially. The adversaries are exploiting open and exposed Elasticsearch interfaces to trigger infections in the cloud...
On March 10, 2021, F5 disclosed eight vulnerabilities, four of which are deemed "critical", the most severe of which is...
China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place...
Wintriage is a live response tool that extracts Windows artifacts, it allows to extract the most artifacts as possible, but...
Egyptian security researcher Sayed Abdelhafiz discovered multiple bugs in TikTok Android Application that can be chained to achieve Remote code...
The FBI’s Internet Crime Complaint Center has released its annual report, the 2020 Internet Crime Report, which includes data from 791,790 complaints...
Prime Minister Boris Johnson declared that Britain needs to boost its cyber capability to conduct cyber attacks on foreign hostile...
Cybersecurity research at WizCase, an online security and privacy portal, built a tool to track accessible ElasticSearch servers on the internet. ...
Summary: Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26872, CVE-2021-26898. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26901...
Summary: encoding/xml in Go before 1.15.9 and 1.16.x before 1.16.1 has an infinite loop if a custom TokenReader (for xml.NewTokenDecoder)...
Summary: Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-27063. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26896 CVSS...
Summary: Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-27063. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26896 CVSS...
Summary: The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer...
Summary: The Scheduler in Grav CMS through 1.7.0-rc.17 allows an attacker to execute a system command by tricking an admin...
A Pennsylvania woman reportedly sent doctored photos and videos of her daughter’s cheerleader rivals to their coaches, in an attempt...