CVE-2020-27216
Summary: In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the...
Summary: In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the...
Summary: In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the...
Summary: In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the...
Last month, Google began a test pilot of its Federated Learning of Cohorts—or FLoC—program, which the company has advertised as...
In traditional software development, programmers code an application in one computing environment before deploying it to a similar, but often...
Researchers at Analyst1 have noticed that the Maze/Egregor ransomware cartel has made at least $75 million in ransom payments to...
A 46-year-old Missouri man has been sentenced to 12 years without parole in US federal prison today for trying to...
Visa, a global payment processor has warned that hackers are on the rise in deploying web shells in infected servers...
The North Korean-backed Lazarus hacking group employed a new backdoor in targeted attacks against a South African freight and logistics...
As per the information provided by the website ‘Have I Been Pwned’, Carding Mafia, a credit card stealing and trading...
Recently, we’ve found malicious code in version 3.17.18 of the official client of the APKPure app store. The app is...
Command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters...
Redcloud is a powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud's...
The Pwn2Own 2021 hacking competition was concluded, participants earned more than $1.2 million, the greatest total payout ever. The Pwn2Own...
CISA released a Splunk-based dashboard for post-compromise activity in Microsoft Azure Active Directory (AD), Office 365, and MS 365 environments. The Cybersecurity...
A threat actor has sold almost 900,000 gift cards and over 300,000 payment cards on a cybercrime forum on the...
Wizcase experts discovered a security flaw in the open-source learning platform Moodle that could allow accounts takeover. At the beginning...
Summary: Multiple issues were addressed with improved logic. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001...
Summary: CA eHealth 6.2.x and 6.3.x before 6.3.2.13 allows remote authenticated users to cause a denial of service or possibly...
Summary: ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service....
Summary: The Database Backups WordPress plugin through 1.2.2.6 does not have CSRF checks, allowing attackers to make a logged in...
Summary: The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection,...
Two Dutch white-hat security specialists entered the annual computer hacking contest Pwn2Own, managed to find a Remote Code Execution (RCE)...
Ransomware operators shut down two production facilities having a place with a European manufacturer in the wake of conveying a...