Low-Risk iOS Wi-Fi Naming Issue can Compromise iPhones Remotely
According to recent research, the Wi-Fi network name issue that entirely disabled an iPhone's network connectivity had remote code execution...
According to recent research, the Wi-Fi network name issue that entirely disabled an iPhone's network connectivity had remote code execution...
Ecuador's state-run Corporación Nacional de Telecomunicación (CNT) suffered a massive ransomware attack causing havoc in the business operations, the payment...
The Department of Commerce restricts trade with four Russian IT and cybersecurity companies together with two additional entities, based on...
Allsafe is an intentionally vulnerable application that contains various vulnerabilities. Unlike other vulnerable Android apps, this one is less like...
Download Regexploit If you like the site, please consider joining the telegram channel or supporting us on Patreon using the...
Fortinet fixes a serious bug in its FortiManager and FortiAnalyzer network management solutions that could be exploited to execute arbitrary...
Microsoft has seized 17 malicious homoglyph domains used by crooks in a business email compromise (BEC) campaign targeting its users. Microsoft’s Digital...
A recently discovered iPhone Wi-Fi bug that could crash the WiFi connectivity could be exploited by attackers to achieve remote...
US DoJ indicted four members of the China-linked cyberespionage group known as APT40 for hacking various entities between 2011 and...
Cisco Talos experts disclose details of several critical flaws in a router monitoring application developed by industrial and IoT firm...
Summary: In Western Digital WD Discovery before 4.0.251.0, a malicious application running with standard user permissions could potentially execute code...
Summary: An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a...
Summary: ** UNSUPPORTED WHEN ASSIGNED ** Polipo through 1.1.1 allows denial of service via a reachable assertion during parsing of...
Summary: An issue in RAONWIZ K Editor v2018.0.0.10 allows attackers to perform a DLL hijacking attack when the service or...
Summary: Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-34501. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34518 CVSS Score...
This blog post was authored by Erika Noerenberg Introduction Over the past months, Malwarebytes researchers have been tracking a unique...
We’ve observed a 419-style scam (also known as an advance fee scam) which combines the promise of cryptocurrency riches with...
The US Department of Homeland Security (DHS) and the US Department of Justice (DOJ)—along with other federal partners—have launched a...
Last week on Malwarebytes Labs: DNS-over-HTTPS takes another small step towards global dominationNope, that isn’t Elon Musk, and he isn’t...
Juniper Networks' Steel-Belted Radius (SBR) Carrier Edition has a severe remote code-execution vulnerability that leaves wireless carrier and fixed operator...
Experts believe that screenshots of work correspondence sent by company employees to third parties may fall into the hands of...
Romanian threat actors are employing a new brute-forcer “Diicot brute” to crack the passwords on Linux-based machines and install cryptominer...
Microsoft as part of its Patch on Tuesday fixed two of the zero-day Windows flaws weaponized by Candiru, an Israeli...
In Vinnytsia city located along the Southern Bug river, a large-scale electricity theft was revealed and recorded by the SBU....