Tala Research Shows that European Telecommunication Websites Expose Sensitive Customer Data
In 7 EU countries, Tala assessed the websites of the leading MSPs for the European top mobile providers, data exposure...
In 7 EU countries, Tala assessed the websites of the leading MSPs for the European top mobile providers, data exposure...
Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.Supported VersionsWindows 10 1507,...
Get SharpHoundThe latest build of SharpHound will always be in the BloodHound repository here Compile InstructionsSharpHound is written using C#...
A malware attack against vehicle inspection services provider Applus Technologies paralyzed preventing vehicle inspections in eight US states. Applus Technologies...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Clop ransomware gang leaked online data stolen from Stanford Medicine, University of Maryland Baltimore, and the University of California. Clop...
On April 3, a user has leaked the phone numbers and personal data of 533 million Facebook users in a...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
Summary: A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur...
Summary: The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6...
Summary: This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function. Reference...
In April 2021, a large data set of 533 million Facebook users was made freely available for download. Encompassing approximately...
In 2020, Russian hackers stole thousands of emails from U.S. State Department employees. As Politico reported, this is the second...
Security researchers at Zimperium zLabs have discovered a new ‘sophisticated’ Android malware posing as a software update application. This malware...
Russia is taking security measures against technology that can hurt big tech companies in the region. In light of new...
A major phishing campaign that reached tens of thousands of inboxes impersonated as MacKenzie Bezos-Scott grant foundation promising monetary advantages...
In a recent cybersecurity incident, an attacker hacked down a vaccine marketplace that was running on the dark web....
Quick tool to help make evasion work a little bit easier. Takes a binary as input and splits it until...
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights...
More clients of Capital One have been impacted in the 2019 data breach, the US bank is notifying them of...
The popular video game publisher Activision is warning gamers that threat actors are actively disguising a remote-access trojan (RAT) in...
The popular code repository hosting service GitHub is investigating a crypto-mining campaign abusing its infrastructure. Code repository hosting service GitHub launched an investigation...
The Avaddon ransomware operators updated their malware after security researchers released a public decryptor in February 2021. The Avaddon ransomware...