CVE-2020-8022
Summary: A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server...
Summary: A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server...
VPNs have been a subject of deliberation for a long time. Is it even important to use one? I think...
Data related to a customer of a recently targeted California-based private cloud solutions firm Accellion is being published online...
Over the past year, a broader pattern of WordPress malware with SQL triggers has occurred within infected databases to mask...
Pillager is designed to provide a simple means of leveraging Go's strong concurrency model to recursively search directories for sensitive...
Gatekeeper is the first open source DoS protection system. It is designed to scale to any peak bandwidth, so it...
The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks....
French experts spotted a new Ryuk ransomware variant that implements self-spreading capabilities to infect other devices on victims’ local networks....
Microsoft announced the release of open-source CodeQL queries that it experts used during its investigation into the SolarWinds supply-chain attack...
Summary: A remote authenticated command injection vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.9.5, 6.8.8-HF1, 6.7.14-HF1....
Summary: Out of bound in camera driver due to lack of check of validation of array index before copying into...
Summary: A flaw was found in mbsync before v1.3.5 and v1.4.1. Validations of the mailbox names returned by IMAP LIST/LSUB...
Summary: Helpcom before v10.0 contains a file download and execution vulnerability caused by storing hardcoded cryptographic key. It finally leads...
Summary: UniFi Protect before v1.17.1 allows an attacker to use spoofed cameras to perform a denial-of-service attack that may cause...
TikTok, the now widely popular social media platform that allows users to create, share, and discover, short video clips has...
Industrial associations have been cautioned for this present week that a critical authentication bypass vulnerability can permit hackers to remotely...
According to the head of the country's General Intelligence and Security Service, these hackers break into the computers of companies...
Google Project Zero team disclosed the details of a recently fixed Windows flaw, tracked as CVE-2021-24093, that can be compromised...
Accidentally, a law firm has disclosed client data of 15,000 incidents in which individuals have been killed and wounded after...
A year into the pandemic, Turkey Dog-related activity is ongoing with campaigns that keep on utilizing the "free internet" lures....
The state of stalkerware in 2020 (PDF) Main findings Kaspersky’s data shows that the scale of the stalkerware issue has...
In warfare, CornerShot is a weapon that allows a soldier to look past a corner (and possibly take a shot),...
An open source implementation of the grantor role in Apple's Wi-Fi Password Sharing protocol. DisclaimerOpenWifiPass is experimental software and is...
Data Breach: WizCase team uncovered a massive data leak containing private information about Turkish Citizens through a misconfigured Amazon S3 bucket....