CVE-2021-0600
Summary: In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app...
Summary: In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app...
Summary: An issue was discovered in Echo ShareCare 8.15.5. The file-upload feature in Access/DownloadFeed_Mnt/FileUpload_Upd.cfm is susceptible to an unrestricted upload...
Summary: Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform...
Summary: A command injection vulnerability in the sandcat plugin of Caldera 2.3.1 and earlier allows authenticated attackers to execute any...
It’s a turbulent time in the cryptomining realm, especially for malware authors. Some big attacks and a lot of publicity...
The list of July 2021 Patch Tuesday updates looks endless. 117 patches with no less than 42 CVEs assigned to...
Loreta and Mindaugas from Horsham, Sussex, were lured in a fake bonus offer from a fraudster who seemed to be...
The ongoing revival of malicious TrickBot malware has been revealed by cybersecurity researchers and shows that the Russia-based transnational cybercriminals...
China launched a destructive "cyber attack" on Nepal Telecom which resulted in Chinese hackers stealing the phone numbers of all...
The Security Service of Ukraine (SBU), Ukraine's top law enforcement agency, reported last week that it had discovered a large-scale...
Spain’s Ministry of the Interior has announced the arrest of 16 individuals connected to the Grandoreiro and Melcoz (also known...
APT actors are known for the frequently targeted nature of their attacks. Typically, they will handpick a set of targets...
VBA tradecraft is constantly evolving and this past winter, I came across some articles from Adepts of 0xCC. Specifically, their...
wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themesThe author...
Complete Arsenal of Memory injection and other techniques for red-teaming in WindowsWhat does Injector do?Process injection support for shellcode located...
Trickbot botnet is back, its authors implemented updates for the VNC module used for remote control of infected systems. The...
Microsoft attributes the recent attacks that have targeted SolarWinds file transfer servers to a China-linked APT group that the experts tracked as...
The infrastructure and leak sites used by the REvil ransomware gang for its operations went offline last night. Starting last...
A CyberNews investigation uncovered a network of wallet addresses used by a scammer group to store and cash out millions...
Adobe addressed multiple critical vulnerabilities in several products, including Adobe Acrobat and Reader application. Adobe addressed multiple critical remote code...
Summary: An improper neutralization of special elements used in an OS Command vulnerability in the administrative interface of FortiMail before...
Summary: A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a...
Summary: Nextcloud Android Client is the Android client for Nextcloud. Clients using the Nextcloud end-to-end encryption feature download the public...
Summary: NVIDIA GeForce Experience, all versions prior to 3.23, contains a vulnerability in the login flow when a user tries...