MITRE and CISA publish the 2021 list of most common hardware weaknesses
MITRE and CISA announced the release of the “2021 Common Weakness Enumeration (CWE) Most Important Hardware Weaknesses” list. MITRE and...
MITRE and CISA announced the release of the “2021 Common Weakness Enumeration (CWE) Most Important Hardware Weaknesses” list. MITRE and...
An alleged member of the TrickBot gang, the Russian national Vladimir Dunaev (aka FFX), has been extradited to the US....
GC2 (Google Command and Control) is a Command and Control application that allows an attacker to execute commands on the...
The Hive ransomware operators have developed a new variant of their malware that can encrypt Linux and FreeBSD. ESET researchers...
A ransomware attack hit Papua New Guinea ‘s finance ministry and disrupted government payments and operations. Government officials confirmed that...
This tool can Installation- git clone https://github.com/HightechSec/scarce-apache2- cd scarce-apache2- bash scarce.shor you can install in your system like this- git...
Europol and Norwegian Police arrested 12 individuals over ransomware attacks on organizations worldwide, including critical infrastructure operators. A joint operation...
This blog post was authored by Hasherezade Twice in the past (2017, 2018) we published a Capture-The-Flag challenge dedicated to...
WordPress, the incredibly popular content management platform, is currently dealing with a nasty plugin bug which allows redirects. What is...
This post was authored by one of the most active helpers on the Malwarebytes forums who wishes to remain anonymous....
Summary: A vulnerability in SSL/TLS message handler for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD)...
Summary: Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense...
Summary: Nextcloud is an open-source, self-hosted productivity platform. A missing permission check in Nextcloud Deck before 1.2.9, 1.4.5 and 1.5.3...
Summary: A vulnerability in the processing of SSH connections for multi-instance deployments of Cisco Firepower Threat Defense (FTD) Software could...
Summary: A vulnerability in the software-based SSL/TLS message handler of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense...
The US NSA and CISA published a security advisory to warn about threat actors compromising 5G networks via cloud infrastructure....
Microsoft researchers have discovered a vulnerability in macOS, dubbed Shrootless, that can allow attackers to bypass System Integrity Protection (SIP)...
Use the HTTP protocol version to send a file bit by bit ("HTTP/1.0" is a 0 and "HTTP/1.1" is a...
Summary: CVE-2021-33044 is an improper authentication vulnerability impacting multiple Dahua products. An exploit was observed in open source and a...
Summary: CVE-2021-33045 is an improper authentication vulnerability impacting multiple Dahua products. An exploit was observed in open source and a...
This summer Kaspersky experts took part in the Machine Learning Security Evasion Competition (MLSEC) — a series of trials testing...
Microsoft finds a flaw in macOS, dubbed Shrootless (CVE-2021-30892), that can allow attackers to bypass System Integrity Protection (SIP). Microsoft discovered a...
A vulnerability in the popular the OptinMonster plugin allows unauthorized API access and sensitive information disclosure. A high-severity vulnerability (CVE-2021-39341)...
HTTPUploadExfil is a (very) simple HTTP server written in Go that's useful for getting files (and other information) off a...