CVE-2021-38111
Summary: The DEF CON 27 badge allows remote attackers to exploit a buffer overflow by sending an oversized packet via...
Summary: The DEF CON 27 badge allows remote attackers to exploit a buffer overflow by sending an oversized packet via...
Nearly one year after the exclusive app Clubhouse launched on the iOS store, its popularity skyrocketed. The app, which is...
Sometimes it’s hard to figure out what exactly is going wrong with your computer. What do you do if you’ve...
Last week on Malwarebytes Labs: Home routers are being hijacked using a vulnerability disclosed just 2 beforeRansomware turncoat leaks Conti...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
As part of multiple campaigns detected by cybersecurity firm SentinelOne, a new AdLoad malware strain is infecting Macs bypassing Apple's...
A vulnerability in Node.js that would permit a remote actor to carry out domain hijacking assaults has been patched. Last week,...
A spear-phishing attack that seems to have commenced in early July 2021, targeting various manufacturing industries in Asia has been...
A Cornell University Tech team with researchers discovered a new kind of backdoor attack that can modify natural-language modelling systems...
Threat actors are using the Malware-as-a-Service (MaaS) model to attack Windows users, according to researchers. The new info-stealer malware “Ficker”...
PickleC2 is a post-exploitation and lateral movements framework. DocumentationReadTheDocs OverviewPickleC2 is a simple C2 framework written in python3 used to...
Grab cam shots from target's phone front camera or PC webcam just sending a link. What is CamPhish?CamPhish is techniques...
Step one, get n8n up and running. Step two, have a spare device to install tor on and use as...
The US FINRA warns US brokerage firms and brokers of an ongoing phishing campaign impersonating its representatives to steal sensitive info. The...
T-Mobile is investigating a possible data breach after a threat actor published a post on a forum claiming to be...
A job ad published by the UK’s Ministry of Defence has revealed the existence of a previously undisclosed secret SAS...
Summary: A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 in filter_intra at libavfilter/vf_bwdif.c, which might lead to memory corruption...
Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...
Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...
Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...
Summary: When apr_time_exp*() or apr_os_exp_time*() functions are invoked with an invalid month field value in Apache Portable Runtime APR 1.6.2...
Summary: A global buffer overflow in the put_font in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of...
Summary: BootPerformanceTable pointer is read from an NVRAM variable in PEI. Recommend setting PcdFirmwarePerformanceDataTableS3Support to FALSE. Reference Links(if available): https://bugzilla.tianocore.org/show_bug.cgi?id=2957...
According to a survey conducted by ESET, a company specializing in anti-virus software development and protection against cyberthreats, most Russians...