CVE-2021-28648
Summary: Trend Micro Antivirus for Mac 2020 v10.5 and 2021 v11 (Consumer) is vulnerable to an improper access control privilege...
Summary: Trend Micro Antivirus for Mac 2020 v10.5 and 2021 v11 (Consumer) is vulnerable to an improper access control privilege...
Summary: HashiCorp Vault and Vault Enterprise 1.5.1 and newer, under certain circumstances, may exclude revoked but unexpired certificates from the...
Summary: The Debian xscreensaver 5.42+dfsg1-1 package for XScreenSaver has cap_net_raw enabled for the /usr/libexec/xscreensaver/sonar file, which allows local users to...
Summary: Stack-based buffer overflow in ESTsoft ALZip 8.51 and earlier allows remote attackers to execute arbitrary code via a crafted...
Assistant Attorney General for National Security John Demers, speaks during a virtual news conference at the Department of Justice on...
We’re no strangers to the Twitter customer support DM slide scam. This is where someone watches an organisation perform customer...
Using a proven method of text messages about missed deliveries, an old player on the Android malware stage has returned...
 According to recent studies, the coronavirus pandemic and working from home (WFH) provisions are triggering a "huge" increase in attacks...
 Security researchers at SentinelLabs revealed the details of a newly identified NTLM (New Technology LAN Manager) relay attack that exploits...
Apple's database was hacked due to cybersecurity deficiencies of the Taiwanese equipment manufacturer. The stolen information is estimated at $50...
 According to MacRumors, the ransomware group that stole schematics from Apple supplier Quanta Computer last week and threatened to release...
 The sensitive information of some leading artists has been compromised in data breaches witnessed by the world's biggest online music...
An advanced multi-threaded, multi-client python reverse shell for hacking linux systems. There's still more work to do so feel free...
Invoke-Stealth is a Simple & Powerful PowerShell Script Obfuscator. This tool helps you to automate the obfuscation process of any...
Google released updates for Chrome 90 that address a new serious issue, tracked as CVE-2021-21227, in the V8 JavaScript engine...
UK rail network Merseyrail was hit by a cyberattack, ransomware operators breached the corporate email system to disclose the attack...
Misconfigured cloud-based databases continue to cause data breaches, millions of database servers are currently exposed across cloud providers. Fugue’s new State...
The FBI has shared with Have I Been Pwned service 4 million email addresses collected by Emotet botnet and employed...
Summary: An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in...
Summary: An issue was discovered in fast_ber through v0.4. yy::yylex() in asn_compiler.hpp has a heap-based buffer over-read. Reference Links(if available):...
Summary: Use after free in IndexedDB in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to...
Summary: Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-26900. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077...
Summary: Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26863, CVE-2021-26875, CVE-2021-26900. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27077...
Summary: Use after free in Blink in Google Chrome on OS X prior to 90.0.4430.72 allowed a remote attacker to...