GoldMax, GoldFinder, and Sibot, 3 new malware used by SolarWinds attackers
Microsoft experts continue to investigate the SolarWinds attack and spotted 3 new strains of malware used as second-stage payloads. Microsoft...
Microsoft experts continue to investigate the SolarWinds attack and spotted 3 new strains of malware used as second-stage payloads. Microsoft...
Summary: An issue was discovered in Joomla! 3.2.0 through 3.9.24. Missing input validation within the template manager. Reference Links(if available):...
Summary: A stack-based buffer overflow vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can...
Summary: In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers...
Summary: A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It...
A developer published via GitHub a proof-of-concept (POC) ransomware program featuring strong compatibility with the post-exploitation tool Cobalt Strike, open-source...
RedEcho, an advanced persistent threat (APT) group from China, has attempted to infiltrate the systems behind India’s power grids, according...
Fifteen schools in the UK were unable to offer online learning as a result of cyberattacks. The schools affected by...
Around 580,000 privilege fliers, KrisFlyer and PPS members have been affected by an information breach, Singapore Airlines (SIA) has said....
Cybercriminal forum Maza was recently hit by a data breach that led to the leak of user information. Earlier this...
PrismHR, a payroll company, suffered a cyber attack over the weekend that caused massive outages to its system. Although there...
CompuCom, a US-managed service provider, has witnessed a DarkSide ransomware attack. It has resulted in a service outage and...
Kubestriker performs numerous in depth checks on kubernetes infra to identify the security misconfigurations and challenges that devops engineers/developers are...
In Bugbounties “If you are not first , then you are last” there is no such thing as silver or...
US managed service provider CompuCom was the victim of a cyberattack that partially disrupted its operations, experts believe it was...
Experts found five vulnerabilities in the Linux kernel, tracked as CVE-2021-26708, that could lead to local privilege escalation. Positive Technologies researcher Alexander...
FireEye researchers spotted a new sophisticated second-stage backdoor that was likely linked to threat actors behind the SolarWinds hack. Malware researchers...
VMware released a security patch for a remote code execution vulnerability that affects the VMware View Planner product. VMware released...
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive related to recently fixed Microsoft Exchange zero-days. ...
Group-IB published a report titled “Ransomware Uncovered 2020-2021”. analyzes ransomware landscape in 2020 and TTPs of major threat actors. Group-IB, a...
Summary: Insufficient data validation in networking in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to bypass discretionary access...
Summary: Use after free in printing in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap...
Summary: Insufficient data validation in navigation in Google Chrome on Android prior to 86.0.4240.75 allowed a remote attacker who had...
Summary: The vulnerabilities can be exploited to cause the web visualization component of the PLC to stop and not respond,...