Security Affairs newsletter Round 321
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Swedish supermarket chain Coop is the first company to disclose the impact of the recent supply chain ransomware attack that...
A supply attack by REvil ransomware operators against Kaseya VSA impacted multiple managed service providers (MSPs) and their clients. A...
Summary: Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary...
Summary: HDFS clients interact with a servlet on the DataNode to browse the HDFS namespace. The NameNode is provided as...
Summary: In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce request which bypasses...
Summary: Flysystem is an open source file storage library for PHP. The whitespace normalisation using in 1.x and 2.x removes...
Summary: An issue was discovered in urllib3 before 1.26.5. When provided with a URL containing many @ characters in the...
In January 2021, the now defunct Iranian social media platform Raychat suffered a data breach that exposed 939 thousand unique...
Kaspersky said that the most professional, most aggressive espionage attacks are carried out by those who speak English, Russian and...
The second wave of deadly COVID-19 has left many countries’ economies in ruins, especially developing countries are undergoing a tough...
The Indian government seems to be gearing up in the wake of the growing threat of cyber-attacks against the Indian...
Currently, the US is the leading cyberspace power, but China is also closing in quickly and will be a tough...
Increasing safety measures led attackers to explore different ways to breach systems. The increasing number of firewall and ransomware attacks...
MacHound is an extension to the Bloodhound audting tool allowing collecting and ingesting of Active Directory relationships on MacOS hosts....
Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's People API....
Wizard Spider, the cybercrime gang behind the TrickBot botnet, is believed to be the author of a new ransomware family dubbed...
Microsoft is urging Azure users to update PowerShell to address a remote code execution vulnerability that was fixed earlier this...
Summary: Improper Input Validation vulnerability in HTTP/2 of Apache Traffic Server allows an attacker to DOS the server. This issue...
Summary: In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization...
Summary: When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file,...
Summary: libqb before 1.0.5 allows local users to overwrite arbitrary files via a symlink attack, because it uses predictable filenames...
Summary: Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary...
A severe ransomware attack reportedly taking place now against the popular Remote Monitoring and Management software tool Kaseya VSA has...