CVE-2021-28789
Summary: The unofficial apple/swift-format extension before 1.1.2 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing...
Summary: The unofficial apple/swift-format extension before 1.1.2 for Visual Studio Code allows remote attackers to execute arbitrary code by constructing...
Summary: A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw...
Summary: XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: Lack of authorisation checks in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly restrict...
In January 2021, the lead generation company Astoria Company allegedly suffered a data breach which exposed over 11M unique email...
An IT contractor working for an IT consultancy company took it upon himself to perform an act of revenge against...
Last week, we looked at a Royal Mail themed scam which has very quickly become the weapon of choice for...
Different local councils in the UK have conveyed SMS to a huge number of citizens to encourage them to cover...
Tesla CEO Elon Musk commented in Russian on the news that Russian Egor Kryuchkov had pleaded guilty on Twitter on...
The United States has sentenced nationals from Russia and North Macedonia to prison for their roles in a transnational cybercrime...
A few days ago, on 17th March, MangaDex found that a malicious actor, who already had access to an administrative...
Malware trackers at Google keep on pointing out a complex APT group that burned through at least 11 zero-days exploits...
A library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but...
A golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a...
This blog post is part of an ongoing series about evaluating Managed Detection and Response (MDR) providers. For more insights,...
In recent weeks, there has been quite a lot of reporting on the exploitation of the latest disclosed vulnerabilities in...
Google addressed a zero-day vulnerability affecting Android devices that use Qualcomm chipsets which is actively exploited in the wild. Google...
U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns of flaws in GE Power Management Devices that could allow an attacker...
Oil and gas giant Royal Dutch Shell (Shell) discloses a data breach resulting from the compromise of its Accellion File...
The Ministry of Defence academy was hit by a major cyber attack, Russia and China state-sponsored hackers are suspected to...