Hacker leaks info of pro-Trump GETTR members online
A hacker has leaked claims to have breached pro-Trump GETTR and leaked the private information of almost 90,000 members on...
A hacker has leaked claims to have breached pro-Trump GETTR and leaked the private information of almost 90,000 members on...
Positive Technologies experts provide details about potential impact of a recently fixes command injection flaw in SonicWall NSM devices. Positive...
Summary: Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). The supported version that is...
Summary: Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Gnuplot). The supported version that is...
Summary: Vulnerability in the Oracle Solaris component of Oracle Sun Systems Products Suite (subcomponent: Filesystem). Supported versions that are affected...
Summary: Unspecified vulnerability in Oracle Sun Solaris 10 and 11.3 allows local users to affect confidentiality, integrity, and availability via...
Summary: Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of...
The official YouTube channel of Kaseya, the latest organization attacked by no less than the criminals behind REvil ransomware, released...
At 11:37 pm on the night of September 20, 2019, cybercriminals launched a ransomware attack against Northshore School District in...
Two weeks after the iphone wifi bug was found, the same cybersecurity analyst Carl Schou discovered a similar different case....
Sweden-based digital rights nonprofit Qurium Media has reported a targeted campaign of distributed denial-of-service (DDoS) attacks on Filipino media outlets...
On May 24th, WSSC Water witnessed a ransomware attack that incapacitated a portion of its network. WSSC Water has been...
One of the most popular fraud schemes involves buying or selling an account in online games. An attacker can offer...
Microsoft is alerting customers to upgrade their installations of PowerShell 7 as soon as possible to protect themselves against a.NET...
Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can...
This project was created to research, build and test different memory injection detection use cases and bypass techniques. The agent...
Kaseya confirmed that the REvil supply-chain ransomware attack hit fewer than 60 of its customers and their customers. Software provider Kaseya...
Group-IB supported INTERPOL in its Operation Lyrebird that allowed to identify a threat actor presumably responsible for multiple attacks. Group-IB, one of the leading...
Taiwanese vendor QNAP addressed a critical flaw, tracked as CVE-2021-28809, that could be exploited to compromise vulnerable NAS devices. Taiwanese vendor...
ENISA publishes Cybersecurity guide for SMEs, a document that aims at providing suggestions to secure their business During the COVID-19...
CISA and the FBI published guidance for the victims impacted by the REvil supply-chain ransomware attack against Kaseya. CISA and the...
Summary: Monstra CMS 3.0.4 allows attackers to execute arbitrary code via a crafted payload entered into the "Snippet content" field...
Summary: Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login. Reference Links(if available):...
Summary: Adobe Illustrator version 25.2 (and earlier) is affected by a Path Traversal vulnerability when parsing a specially crafted file....