SolarWinds Attack: Microsoft sheds lights into Solorigate second-stage activation
Microsoft’s report provides details of the entire SolarWinds attack chain with a deep dive in the second-stage activation of malware...
Microsoft’s report provides details of the entire SolarWinds attack chain with a deep dive in the second-stage activation of malware...
Cisco fixed multiple flaws in Cisco SD-WAN products that could allow an unauthenticated, remote attacker to execute attacks against its devices....
Flaws in popular messaging apps, such as Signal and FB Messenger allowed to force a target device to transmit audio...
Summary: OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability involving the build...
Summary: Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-1658, CVE-2021-1660, CVE-2021-1664, CVE-2021-1666, CVE-2021-1667,...
Summary: OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check...
Summary: OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the application's BasePage registers an AJAX event listener...
Summary: Windows Hyper-V Elevation of Privilege Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1704 CVSS Score (if available) v2: / HIGH v3: /...
Oracle Co-Founder Larry Ellison delivers a keynote address at the Oracle OpenWorld conference in 2006. Researchers discovered a new Internet...
Metadata, which gives background information on pieces of data, is typically hidden. It becomes a problem when accidentally revealed. Often...
The main weapon used by money launders to launder cash is bitcoin and other cryptocurrencies alternatives. India’s cryptocurrency exchanges deployed...
Headquartered in Hammersmith, London (UK)- AnyVan is a European online platform for the patrons to access consignment, transport, and removal...
The New York State Department of Motor Vehicles cautioned New Yorkers of progressing text message phishing schemes. These counterfeit text...
This is a simple script intended to perform a full recon on an objective with multiple subdomains tl;drRequires Go Run...
A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting WeaponsOSTypeNameDescriptionAllAnalysisRMS-Runtime-Mobile-SecurityRuntime Mobile Security (RMS) - is a...
Purchasing software through AWS Marketplace has to be one of the most under-appreciated perks of being an Amazon Web Services...
The Russian cryptocurrency exchange Livecoin has announced it is terminating its operation following the December cyberattack. The Russian cryptocurrency exchange...
Cybersecurity firm FireEye has released a report that sheds the light on the SolarWinds attack and the way hackers breached...
Cyber security firm Malwarebytes announced that threat actor behind the SolarWinds attack also breached its network last year. Malwarebytes revealed...
The threat actors behind the SolarWinds attack used malware dubbed Raindrop for lateral movement and deploying additional payloads. Security experts...
Summary: A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could...
Summary: In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column...
Summary: When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if...
Summary: Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request...