CVE-2020-10648
Summary: Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a...
Summary: Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a...
Summary: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is...
Researchers at Guardicore have identified a new infection vector being used by the Perkiler malware where internet-facing Windows machines are...
The enormous work messaging platform Slack quickly reversed course yesterday, promising to revise a brand-new direct message feature that could...
The Anonymous hacker group published an analysis of documents belonging to various British government agencies, including the Foreign Office, according...
A database with the names and ID numbers of all the eligible voters in Israel was leaked online by anonymous...
A malware that has verifiably targeted exposed Windows machines through phishing and exploit kits have been retooled to add new...
The Clop ransomware group has officially published online the grades and social security numbers for students at the University of...
Figures Indicator H1 2020 H2 2020 2020 Global percentage of attacked ICS computers 32.6% 33.42% 38.55% Percentage of attacked ICS...
Find exposed AWS cloud assets that you did not know you had. A comprehensive asset inventory is step one to...
OSINT tool to get information from a github profile and find GitHub user's email addresses leaked on commits.How does this...
Mitigate threats by going on the offensiveWhile the definition of threat hunting may be straightforward—proactively hunting for threats—the reality of...
Threat actors are offering fake COVID-19 test results and vaccination certificates in blackmarkets and hacking forums on the Dark Web....
Researchers discovered the availability in the DarK Web of 30M of records of Americans affected by the Astoria Company data...
Cisco has addressed a critical arbitrary program execution flaw in its Cisco Jabber client software for Windows, macOS, Android, and...
Summary: When a user opens manipulated Jupiter Tessellation (.JT) format files received from untrusted sources in SAP 3D Visual Enterprise...
Summary: When a user opens manipulated Interchange File Format (.IFF) format files received from untrusted sources in SAP 3D Visual...
Summary: Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target,...
Summary: Use after free in GPU driver while mapping the user memory to GPU memory due to improper check of...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
We’ve been tracking a fraudulent scheme involving renewal notifications for several months now. It came to our attention because the...
GitHub awarded $25,000 to the security researcher, Teddy Katz for discovering a bug and patching it. On March 17, bug...
The Central Bank of Russia has warned of the emergence of a group of hackers investigating vulnerabilities in banks' mobile...
A lot of people are familiar with the US Internal Revenue Service (IRS) scam letters about the tax season that...