Vermilion Strike, a Linux implementation of Cobalt Strike Beacon used in attacks
Researchers discovered Linux and Windows implementations of the Cobalt Strike Beacon developed by attackers that were actively used in attacks in the...
Researchers discovered Linux and Windows implementations of the Cobalt Strike Beacon developed by attackers that were actively used in attacks in the...
Experts found a critical flaw, tracked as CVE-2021-23406, in the popular NPM package ‘Pac-Resolver‘ that has millions of downloads every week....
Apple released security patches to fix two zero-day vulnerabilities in iOS and macOS that are actively exploited in attacks in...
Facebook announced it will allow WhatsApp users to encrypt their message history backups in the cloud. Facebook will continue to...
Summary: An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to...
Summary: The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than...
Summary: The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly...
Summary: The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly...
Summary: The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly...
Summary: The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which...
Summary: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31969 https://www.zerodayinitiative.com/advisories/ZDI-21-797/ CVSS Score (if available)...
Summary: CVE-2021-30860 is an integer overflow vulnerability impacting Apple macOS Catalina, Apple macOS Big Sur versions 11.5.2 and earlier, Apple...
This blog post was authored by Jérôme Segura During the past couple of years online shopping has continued to increase...
A recent spate of ransomware attacks in the US and abroad have derailed major corporations, spurring a fuel shortage on...
Last week on Malwarebytes Labs Apple delays plans to search devices for child abuse imagery.ProtonMail hands user’s IP address and...
Cybersecurity researchers at GitHub have uncovered arbitrary code execution vulnerabilities in the open-source Node.js packages, "tar" and "@npmcli/arborist,". The tar package...
Full Self Driving (FSD) beta software of the TESLA car has been leaked, and it is circulated in and around...
Microsoft alerted some Azure cloud computing users that a vulnerability uncovered by security experts might have given hackers access to...
The website of the Russian government was recently hacked. The fraudsters started a phoney Bitcoin (BTC) scheme, which they then...
Download full report (PDF) The Incident response analyst report provides insights into incident investigation services conducted by Kaspersky in 2020....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
What is Peirates?Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. It...
GoKart is a static analysis tool for Go that finds vulnerabilities using the SSA (single static assignment) form of Go...
Spook.js is a new side-channel attack on modern processors that can allow bypassing Site Isolation protections implemented in Google Chrome. Boffins...