CVE-2021-21341
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
Summary: In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized...
Summary: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication...
A newly discovered bug, patched in macOS 11.3, allowed hackers to circumvent much of Apple’s built-in malware detection for programs...
In the latest example of a supply chain attack, cybercriminals delivered malware to customers of the business password manager Passwordstate...
We recently said deepfakes “remain the weapon of choice for malign interference campaigns, troll farms, revenge porn, and occasionally humorous...
This week on Lock and Code, we speak to Malwarebytes Chief Information Security Officer John Donovan about the flaws in...
The Internet Watch Foundation (IWF), a not-for-profit organization in England whose mission is “to eliminate child sexual abuse imagery online”,...
Fortinet security researcher ‘accidentally discovered a unique way of tricking YouTube users. Due to Covid-19, as well as the recent...
A ransomware group made $260,000 by remotely encrypting files on QNAP computers using the 7zip archive software in an interval...
A threat actor dropped about 20 million Big Basket user reports containing personally identifiable details and hashed passwords on a...
Easily create permutations and combinations of words with predefined sets of extensions, words and patterns/function. You can use this tool...
Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well...
European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows...
Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts...
The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another...
Summary: Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie...
Summary: Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie...
Summary: Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie...
Summary: Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie...
Summary: Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie...
Summary: Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie...
Summary: Unrestricted file upload vulnerability on Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie...