CVE-2021-21204
Summary: Use after free in Blink in Google Chrome on OS X prior to 90.0.4430.72 allowed a remote attacker to...
Summary: Use after free in Blink in Google Chrome on OS X prior to 90.0.4430.72 allowed a remote attacker to...
In March 2021, the Brazilian EdTech company Descomplica suffered a data breach which was subsequently posted to a popular hacking...
In August 2020, the workout tracking app Jefit suffered a data breach. The data was subsequently sold within the hacking...
One day after a ransomware group shared hacked data that allegedly belonged to the Washington, D.C. Police Department online, the...
 Emotet, one of the most dangerous email spam botnets in recent history, is being wiped out today from all infected...
 While the world was focused on President Donald Trump's departure on Jan. 20, an obscure Florida corporation quietly revealed a...
Kaspersky Lab, which specializes in developing systems to protect against cyber threats, reported a fraudulent mailing on behalf of The...
 As of 22nd April 2021, a Pompompurin named hacker group dropped a database of more than 250 (250,806,711) million American...
 Due to its intriguing features, the much-hyped announcement of AirDrop at the Apple event drew a lot of attention. However,...
For four years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent...
Lookups for real IP starting from the favicon icon and using Shodan.Installationpip3 install -r requirements.txt Shodan API key (not the...
Offline search tool for LDAP directory dumps in LDIF format. FeaturesFast and memory efficient parsing of LDIF files Build ldapsearch...
CISA and NIST published a report on software supply chain attacks that shed light on the associated risks and provide...
Officials revealed that the school district near Albany was hit by a ransomware attack that forced students in grades 7...
Microsoft announced an improvement of its Defender antivirus that will leverage Intel’s Threat Detection Technology (TDT) to detect processes associated...
Apple addresses a zero-day in macOS exploited by Shlayer malware to bypass Apple’s security features and deliver second-stage malicious payloads. Apple...
Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information. Boffins from the...
Summary: A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there...
Summary: In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized...
Summary: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR R7800 firmware version 1.0.2.76. Authentication...
A newly discovered bug, patched in macOS 11.3, allowed hackers to circumvent much of Apple’s built-in malware detection for programs...
In the latest example of a supply chain attack, cybercriminals delivered malware to customers of the business password manager Passwordstate...