Facebook took action against China-linked APT targeting Uyghur activists
Facebook has closed accounts used by a China-linked APT to distribute malware to spy on Uyghurs activists, journalists, and dissidents living...
Facebook has closed accounts used by a China-linked APT to distribute malware to spy on Uyghurs activists, journalists, and dissidents living...
Summary: In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function...
Summary: Certain NETGEAR devices are affected by command injection by an authenticated user. This affects XR450 before 2.3.2.114, XR500 before...
Summary: Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a...
Summary: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is...
Researchers at Guardicore have identified a new infection vector being used by the Perkiler malware where internet-facing Windows machines are...
The enormous work messaging platform Slack quickly reversed course yesterday, promising to revise a brand-new direct message feature that could...
The Anonymous hacker group published an analysis of documents belonging to various British government agencies, including the Foreign Office, according...
A database with the names and ID numbers of all the eligible voters in Israel was leaked online by anonymous...
A malware that has verifiably targeted exposed Windows machines through phishing and exploit kits have been retooled to add new...
The Clop ransomware group has officially published online the grades and social security numbers for students at the University of...
Figures Indicator H1 2020 H2 2020 2020 Global percentage of attacked ICS computers 32.6% 33.42% 38.55% Percentage of attacked ICS...
Find exposed AWS cloud assets that you did not know you had. A comprehensive asset inventory is step one to...
OSINT tool to get information from a github profile and find GitHub user's email addresses leaked on commits.How does this...
Mitigate threats by going on the offensiveWhile the definition of threat hunting may be straightforward—proactively hunting for threats—the reality of...
Threat actors are offering fake COVID-19 test results and vaccination certificates in blackmarkets and hacking forums on the Dark Web....
Researchers discovered the availability in the DarK Web of 30M of records of Americans affected by the Astoria Company data...
Cisco has addressed a critical arbitrary program execution flaw in its Cisco Jabber client software for Windows, macOS, Android, and...
Summary: When a user opens manipulated Jupiter Tessellation (.JT) format files received from untrusted sources in SAP 3D Visual Enterprise...
Summary: When a user opens manipulated Interchange File Format (.IFF) format files received from untrusted sources in SAP 3D Visual...
Summary: Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target,...
Summary: Use after free in GPU driver while mapping the user memory to GPU memory due to improper check of...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
We’ve been tracking a fraudulent scheme involving renewal notifications for several months now. It came to our attention because the...