Revil ransomware operators are targeting new victims
Recently we observed that part of the REvil ransomware infrastructure was up and running again, now we can confirm that...
Recently we observed that part of the REvil ransomware infrastructure was up and running again, now we can confirm that...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Cisco fixed multiple high-severity flaws in the IOS XR software that can allow attackers to trigger a DoS condition, elevate...
Summary: An issue was discovered in gpac 0.8.0. The strdup function in box_code_base.c has a heap-based buffer over-read. Reference Links(if...
Summary: The find_color_or_error function in gifsicle 1.92 contains a NULL pointer dereference. Reference Links(if available): https://github.com/kohler/gifsicle/issues/140 CVSS Score (if available)...
Summary: messages_load.php in ClinicCases 7.3.3 suffers from a blind SQL injection vulnerability, which allows low-privileged attackers to execute arbitrary SQL...
Summary: In Pure-FTPd 1.0.49, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size,...
The Verkhovna Rada of Ukraine adopted the bill "On virtual assets", which will legalize cryptocurrency and virtual hryvnia.The bill on...
 NBC News, an American broadcaster has published a report on the data theft of millions of school children and how...
 In July, a hacker invaded the email accounts of the Virginia Military Department and the Virginia Defense Force, told a...
 Hackers breached the United Nations' computer network and stole data, according to researchers at cybersecurity firm Resecurity, According to Bloomberg, the...
 A newly found side-channel attack targeting Google Chrome might allow an attacker to use a Spectre-style attack to bypass the...
Pollenisator is a tool aiming to assist pentesters and auditor automating the use of some tools/scripts and keep track of...
"Karta" (Russian for "Map") is an IDA Python plugin that identifies and matches open-sourced libraries in a given binary. The...
SOVA is a new Android banking trojan that targets banking applications, cryptocurrency wallets, and shopping apps from the U.S. and...
Microsoft has fixed the Azurescape issue, a flaw in Azure Container Instances that allows to take over containers of other...
BlackMatter Ransomware NOTE: The information on this page is automated and scraped directly from the BlackMatter Onion Dark Web Tor...
Summary: An issue was discovered in gpac 0.8.0. The strdup function in box_code_base.c has a heap-based buffer over-read. Reference Links(if...
Summary: The find_color_or_error function in gifsicle 1.92 contains a NULL pointer dereference. Reference Links(if available): https://github.com/kohler/gifsicle/issues/140 CVSS Score (if available)...
Summary: messages_load.php in ClinicCases 7.3.3 suffers from a blind SQL injection vulnerability, which allows low-privileged attackers to execute arbitrary SQL...
Summary: In Pure-FTPd 1.0.49, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size,...
Summary: An improper access control vulnerability in FortiManager versions 6.4.0 to 6.4.3 may allow an authenticated attacker with a restricted...
Elizabeth Denham, current head of the Information Commissioner’s Office (ICO), the UK’s data protection watchdog and the organization tasked to...
Facebook, neck-deep in virtual / augmented reality with the Oculus headset, continues to move things up a gear. It’s announced...