CVE-2020-27284
Summary: TPEditor (v1.98 and prior) is vulnerable to two out-of-bounds write instances in the way it processes project files, allowing...
Summary: TPEditor (v1.98 and prior) is vulnerable to two out-of-bounds write instances in the way it processes project files, allowing...
Summary: An untrusted pointer dereference has been identified in the way TPEditor(v1.98 and prior) processes project files, allowing an attacker...
Summary: An uninitialized pointer issue has been identified in the way the application processes project files, allowing an attacker to...
Summary: Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to...
A piece of cryptojacking malware with a penchant for targeting the cloud has gotten some updates that makes it easier...
As thoughts turn to Data Privacy this week in a big way, GDPR illustrates it isn’t an afterthought. Grindr, the...
According to the expert, to protect yourself from phishing attacks and fraud using malicious software aimed at people working remotely,...
 The European Union Agency for Law Enforcement announced that a global collaboration of law enforcement agencies had disrupted Emotet, what...
 Threats have changed how the typical ransomware assault works: Instead of encrypting the data and demanding ransom in return for...
 Trend Micro's Zero Day Initiative (ZDI) on Tuesday announced the targets, prizes, and rules for the Pwn2Own Vancouver 2021 hacking...
2020 saw an unprecedented increase in the importance and value of digital services and infrastructure. From the rise of remote...
Simple python script to check against hypothetical JWT vulnerability. Let's say there is an application that uses JWT tokens signed...
A tool to enumerate and spray valid Active Directory accounts through Kerberos Pre-Authentication. BackgroundAlthough many Kerberos password spraying tools currently...
The TeamTNT cybercrime group has improved its Linux cryptocurrency miner by implementing open-source detection evasion capabilities. The TeamTNT cybercrime group...
Researchers from RiskIQ have discovered a new phishing kit dubbed LogoKit that dynamically compose phishing content. Researchers from RiskIQ discovered...
The U.S. CISA published a security advisory for High-Severity flaws in some SCADA/HMI products made by Japanese company Fuji Electric....
A joint operation of U.S. and EU law enforcement authorities allowed the seizure of the leak sites used by NetWalker...
A global operation of law enforcement has dismantled the infrastructure of the infamous Emotet botnet. A global operation of law...
Trend Micro’s Zero Day Initiative announced the Pwn2Own Vancouver 2021 hacking competition that will also cover Zoom, MS Teams Exploits....
Summary: Use after free in Blink in Google Chrome prior to 83.0.4103.61 allowed a remote attacker to potentially exploit heap...
Summary: Heap buffer overflow in PDFium in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap...
Summary: Out of bounds memory access in developer tools in Google Chrome prior to 84.0.4147.89 allowed an attacker who convinced...
Summary: IBM MQ Internet Pass-Thru 2.1 and 9.2 could allow a remote user to cause a denial of service by...
Summary: Vulnerability in the Oracle Financial Services Hedge Management and IFRS Valuations component of Oracle Financial Services Applications (subcomponent: User...