APT: China-Based Threat Group Attacks Pulse Secure VPNs
Several hacker groups that are supposed to support Chinese long-term economic goals continue in the defense, high-tech, public, transportation, and...
Several hacker groups that are supposed to support Chinese long-term economic goals continue in the defense, high-tech, public, transportation, and...
CERT Kaiju is a collection of binary analysis tools for Ghidra. This is a Ghidra/Java implementation of some features of...
This repository has been made basing onto the already existing MiscTool, so big shout-out to rasta-mouse for releasing them and...
Interpol has intercepted $83 million in illicit funds transferred from victims to the accounts used by crooks. An operation conducted...
Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature....
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Qihoo 360 NETLAB spotted a new backdoor dubbed Facefish that could allow attackers to take over Linux systems and steal...
The FBI is going to share compromised passwords discovered during investigations with Have I Been Pwned (HIBP)’s ‘Pwned Passwords’ service....
Secured Search is a browser hijacker that changes your browser’s settings to promote securedsearch.com, let’s remove it. Secured Search is...
Summary: Jenkins URLTrigger Plugin 0.48 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks....
Summary: A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix...
Summary: An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security...
Summary: An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security...
Big Sur 11.4 was updated this week to fix a zero-day vulnerability that allowed users to capture screenshots, capture video,...
Kaspersky Lab noted that the new attacks differ from cyberattacks using encryption viruses in that the scammers do not use...
The Bruhat Bengaluru Mahanagara Palike (BBMP) has shut down its COVID-19 test data collection portal after a possible data breach,...
SonicWall urges customers to “immediately” patch a post-authentication vulnerability that impacts on-premises versions of the Network Security Manager (NSM) multi-tenant...
A popular phishing campaign tries to somehow get users to believe that they've enrolled in the film streaming platform to...
IMAPLoginTester is a simple Python script that reads a text file with lots of e-mails and passwords, and tries to...
php webshell Since I derped, and forgot to talk about usage. Here goes. For this shell to work, you need...
SonicWall urges customers to address a post-authentication flaw that affects on-premises versions of the Network Security Manager (NSM). SonicWall urges...
Industrial cybersecurity firm Claroty discovered a new flaw in Siemens PLCs that can be exploited by a remote and unauthenticated...
Summary: An information disclosure vulnerability was discovered in /index.class.php (via port 8181) on NetWave System 1.0 which allows unauthenticated attackers...
Summary: In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free....