Expired certificate caused a Pulse Secure VPN global scale outage
Pulse Secure VPN users were not able to login due to the expiration of a code signing certificate used to...
Pulse Secure VPN users were not able to login due to the expiration of a code signing certificate used to...
President Joe Biden has appointed two former senior NSA officials for two prominent cyber roles in his administration. President Joe...
Summary: A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Solid Edge SE2021 (All Versions <...
Summary: An issue was discovered in the Linux kernel before 5.7. The KVM subsystem allows out-of-range access to memslots after...
Summary: The certificate upload in NetIQ eDirectory PKI plugin before 8.8.8 Patch 10 Hotfix 1 could be abused to upload...
Summary: Information leakage vulnerability in NetIQ eDirectory before 9.1.1 HF1 due to shared memory usage. Reference Links(if available): https://www.netiq.com/documentation/edirectory-91/edirectory9111_releasenotes/data/edirectory9111_releasenotes.html CVSS...
Summary: Directory traversal in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an...
Many of us who read the news daily encounter a regular drum beat of ransomware stories that are both worrying...
An Italian citizen’s apparent attempt to hire a hitman on the Dark Web has been undone by clever analysis of...
Google revealed last month that it is rolling out the Federated Learning of Cohorts (FLoC) program, an important part of...
On Sunday 11th of April, just hours after newly developed centrifuges, which could enrich uranium faster were launched in Iran,...
dwn is a "docker-compose for hackers". Using a simple YAML "plan" format similar to docker-compose, image names, versions and volume...
Zero config (IoT) firewall. SYNwall is a project built (for the time being) as a Linux Kernel Module, to implement...
Microsoft released as open-source the ‘CyberBattleSim Python-based toolkit which is an Enterprise Environment Simulator. Microsoft has recently announced the open-source...
LinkedIn has formally denied that the recently disclosed data leak was caused by a security breach, data were obtained via...
Fitch Ratings is warning that cyberattacks could pose a risk to water and sewer utilities potentially impacting their ability to...
Summary: CA Release Automation (formerly LISA Release Automation) 5.0.2 before 5.0.2-227, 5.5.1 before 5.5.1-1616, 5.5.2 before 5.5.2-434, and 6.1.0 before...
Summary: DMA Softlab Radius Manager 4.4.0 allows CSRF with impacts such as adding new manager accounts via admin.php. Reference Links(if...
Summary: A vulnerability in the implementation of the Intermediate System–to–Intermediate System (IS–IS) routing protocol functionality in Cisco IOS XR Software...
Summary: SAP NetWeaver AS JAVA, versions - (ENGINEAPI 7.10; WSRM 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; J2EE-FRMW 7.10, 7.11),...
Summary: The casrvc program in CA Common Services, as used in CA Client Automation 12.8, 12.9, and 14.0; CA SystemEDGE...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we...
Fake banking apps laced with malware remain a crucial factor in the success of threat actors. For the Yanbian gang,...
Belden has uncovered that extra information was accessed and copied during their November 2020 cyberattack related to employees' medical care...