CVE-2021-41223
Summary: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `FusedBatchNorm` kernels is vulnerable...
Summary: TensorFlow is an open source platform for machine learning. In affected versions the implementation of `FusedBatchNorm` kernels is vulnerable...
Summary: TensorFlow is an open source platform for machine learning. In affected versions an attacker can trigger undefined behavior, integer...
It shouldn’t be surprising that Android devices are the targets of threats like adware and other Potentially Unwanted Programs (PUPs)....
Romanian police arrested two alleged Sodinokibi/REvil ransomware affiliates accused to have orchestrated attacks against thousands of victims. Romanian law enforcement...
In October 2021, security researcher Bob Diachenko discovered an exposed database he attributed to ActMobile, the operators of Dash VPN...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
FeaturesProtocol Agnostic - Currently supporting HTTP, HTTPS, HTTP/2. Other  Note: If the request count is too low for the...
Summary: CVE-2015-3636 is a use after free vulnerability impacting Linux kernel before versions 4.0.3. An exploit was observed in open...
Summary: CVE-2015-1805 is an unspecified vulnerability impacting Linux kernel before versions 3.16. An exploit was observed in open source and...
Summary: CVE-2020-0041 is an out-of-bounds write vulnerability impacting Google Android. An exploit was observed in open source and subsequently shared...
The U.S. government offers up to $10 million for identifying or locating leaders in the REvil/Sodinokibi ransomware operation The Department...
The US DoJ has charged a REvil ransomware affiliate that is suspected to have orchestrated the attack on Kaseya MSP...
News overview Q3 2021 brought two new DDoS attack vectors, potentially posing a serious threat, including for major web resources....
continews NOTE: The information on this page is automated and scraped directly from the Conti .onion Dark Web Tor Blog...
We’ve seen quite a few complaints from gamers this past weekend, unable to load up and play games on the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Electronics retail giant MediaMarkt was hit by a ransomware attack that disrupted store operations in the Netherlands and Germany. Electronics retail...
This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking"...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
LockBit 2.0 Ransomware NOTE: The information on this page is automated and scraped directly from the LockBit 2.0 Onion Dark...
The cybersecurity basics should be just that—basic. Easy to do, agreed-upon, and adopted at a near 100 percent rate by...
The healthcare industry might be known for the work it does to treat patients. But it is also a prime...
Summary: RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve unauthorized access...
Summary: RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve a pool...