WordPress Download Manager Plugin was affected by two flaws
An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under...
An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under...
The 2021 attacks on two water treatment facilities in the US—combined with ransomware attacks on an oil and gas supplier...
A new investigation report has been published by SonicWall network security organization in which it stated that ransomware attacks have...
Analysts from Cofense Phishing Defense Center recently found a unique PayPal credential phishing attack. Phishing is a harmful technique that...
Cybersecurity researcher Manfred Paul revealed the details of the code for abusing a critical flaw in the Linux eBPF (Extended...
A year ago, the United Kingdom, the USA, and Canada released a coordinated advisory, during the global pandemic, revealing a...
President Joe Biden's appeal for Vladimir Putin to crack down on cyberattacks emanating from within Russia appears to have failed...
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance...
A PowerShell script to collect memory and (triage) disk forensics for incident response investigations. The script leverages a network share,...
Kaspersky experts spotted a previously undocumented Chinese-speaking threat actor, tracked as GhostEmperor, that is targeting Microsoft Exchange flaws in attacks...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure...
Microsoft Office 365 email accounts of employees at 27 US Attorneys’ offices were breached by the Russia-linked SVR group as part of...
Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...
Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...
Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...
Summary: SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3...
Summary: ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that...
Summary: A heap buffer overflow vulnerability in msadpcm_decode_block of libsndfile 1.0.30 allows attackers to execute arbitrary code via a crafted...
Summary: Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer...
In the latest study, researchers at Positive Technologies have documented the evolution of hacker-placed ads on the Dark Web from...
The Copilot service developed by Microsoft and GitHub specialists, designed to simplify the work of programmers, can be used by...
The cyber-attack that crippled Iran's national railway system at the beginning of the month was caused by a disk-wiping malware...
The Polish authorities have detained two individuals committing so-called ‘Black Box’ attacks, targeting ATMs, whereby criminal offenders attach electronic devices...