Japan mentioned Russia in its new cybersecurity strategy
The Japanese government on Tuesday officially approved a new three-year cybersecurity strategy, where Russia, China and North Korea are mentioned...
The Japanese government on Tuesday officially approved a new three-year cybersecurity strategy, where Russia, China and North Korea are mentioned...
Cybersecurity researcher at Comparitech has identified a misconfigured MongoDB database containing a treasure trove of data left uncovered to the...
A fully working exploit for the remote code execution vulnerability in VMware vCenter labelled as CVE-2021-22005 is now publicly accessible,...
One of the prominent targets for hackers is Microsoft Exchange, and the attack vector typically involves a popular vulnerability which...
Hackers have used a credential phishing attack to steal data from Office 365, Google Workspace, and Microsoft Exchange by spoofing...
Background In December 2020, news of the SolarWinds incident took the world by storm. While supply-chain attacks were already a...
WebStor is a tool implemented in Python under the MIT license for quickly enumerating all websites across all of your...
Kodex (Community Edition - CE) is an open-source toolkit for privacy and security engineering. It helps you to automate data...
Security researchers uncovered a massive malware operation, dubbed GriftHorse, that has already infected more than 10 million Android devices worldwide....
The U.S. CISA and the NSA agencies have published guidance for securely using virtual private network (VPN) solutions. The U.S....
Russian media reported that the police made searches in the Moscow office of security firm Group-IB apparently linked to an...
Experts spotted a new variant of the FinFisher surveillance spyware that is able to hijack and replace the Windows UEFI...
Trend Micro has addressed a critical authentication bypass vulnerability, tracked as CVE-2021-36745, affecting the ServerProtect solution. Trend Micro has released security patches...
Summary: setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the...
Summary: setup.cgi on NETGEAR R6020 1.0.0.48 devices allows an admin to execute arbitrary shell commands via shell metacharacters in the...
Summary: Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c. Reference Links(if available): https://github.com/saitoha/libsixel/issues/114 CVSS Score...
Summary: Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c. Reference Links(if available): https://github.com/saitoha/libsixel/issues/114 CVSS Score...
Summary: Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c. Reference Links(if available): https://github.com/saitoha/libsixel/issues/116 CVSS Score...
Summary: Libsixel 1.8.3 contains a heap-based buffer overflow in the sixel_encode_highcolor function in tosixel.c. Reference Links(if available): https://github.com/saitoha/libsixel/issues/116 CVSS Score...
Summary: FFmpeg
Summary: Improper privilege management vulnerability in maconfig for McAfee Agent for Windows prior to 5.7.4 allows a local user to...
Microsoft’s Threat Intelligence Center has been analyzing a custom-built backdoor that has been used by the Nobelium group since April...
pcTattleTale hasn’t been very careful about securing the screenshots it sneakily takes from its victims’ phones. pcTattleTale markets itself as...
Positive Technologies is developing a new concept of cyber security standard. The document should become an open knowledge base, which...