Cyber Defense Magazine – June 2021 has arrived. Enjoy it!
Cyber Defense Magazine June 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 129 pages of...
Cyber Defense Magazine June 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 129 pages of...
A critical zero-day vulnerability in the Fancy Product Designer WordPress plugin exposes more than 17,000 websites to attacks. Researchers from...
Summary: Use after free in Blink in Google Chrome prior to 89.0.4389.128 allowed a remote attacker to potentially exploit heap...
Summary: Use after free in IndexedDB in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to...
Summary: An improper access control vulnerability has been reported to affect earlier versions of Music Station. If exploited, this vulnerability...
Summary: A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with...
Summary: Koel before 5.1.4 lacks login throttling, lacks a password strength policy, and shows whether a failed login attempt had...
In April 2021, 13TB of compromised Dominos India appeared for sale on a hacking forum after which the company acknowledged...
This week another major supplier reported it had been hit with ransomware. After the Colonial Pipeline attack last month, this...
The ongoing multi-vendor investigations into the SolarWinds mega-hack took a new turn this week when additional malware artifacts were discovered...
Two independent investigations into an unauthorized data breach and the handling of sensitive information have been announced by the Reserve...
The Secretary of the Security Council also reported on cyber security threats in the draft of the new National Security...
Security researchers at imec-DistriNet Research Group have discovered the vulnerabilities in e-book reading systems that allow hackers to exploit the...
Nobelium, a Russian hacking group that was responsible for the 2020 SolarWinds cyberattacks, is back in the game, however, now,...
Python Obfuscator To Generate One-Liners And FUD Payloads.Download & Rungit clone https://github.com/spicesouls/onelinepycd onelinepychmod +x setup.sh./setup.shonelinepy Usage Guide _ _ ___...
What?Arkhota is a web (HTTP/S) brute forcer for Android. Why?A web brute forcer is always in a hacker's computer, for...
CyberNews researchers found that front-runners are abusing decentralized cryptocurrency exchanges by draining hundreds of millions in crypto from trader transactions...
Group-IB discovered a database allegedly belonging to a bulletproof hosting provider DDoS-Guard posted for sale on a cybercrime forum. Group-IB,...
Zero-day exploit broker Zerodium is looking for 0day exploits affecting the IM client tool Pidgin on Windows and Linux. Zero-day...
The US DoJ seized two domains used by APT29 group in recent attacks impersonating the U.S. USAID to spread malware....
White House spokeswoman speculates threat actors behind the JBS ransomware attack have a Russian origin. The American food processing giant...
Researchers spotted a new piece of ransomware named Epsilon Red that was employed at least in an attack against a...
Summary: A Memory Corruption Vulnerability in Autodesk FBX Review version 1.4.0 may lead to remote code execution through maliciously crafted...
Summary: An issue was discovered in xfs_setattr_nonsize in fs/xfs/xfs_iops.c in the Linux kernel through 5.2.9. XFS partially wedges when a...