16.17 GB of User Data Stored in Fitness Bands, Exposed
The development and sudden boom in IoT equipment in the healthcare sector have resulted in the surge of cyber attacks....
The development and sudden boom in IoT equipment in the healthcare sector have resulted in the surge of cyber attacks....
On Tuesday, Massachusetts Attorney General Maura Healey announced that she will look into the cyberattack on T-Mobile US Inc (TMUS.O),...
A security flaw in the WooCommerce Multi Currency plugin might allow any consumer to alter product prices in online stores....
This summer, several events that were postponed from 2020 due to the pandemic took place. Some of them interested children,...
REvil Happy Blog NOTE: The information on this page is automated and scraped directly from the Revil Happy Blog page...
A fast tool to check missing hosted DNS zones that can lead to subdomain takeover. What is a DNS takeover?DNS...
Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution)Creation of this Script is based on some reverse...
Plution is a convenient way to scan at scale for pages that are vulnerable to client side prototype pollution via...
Time for another Kali Linux release! – Kali Linux 2021.1. This release has various impressive updates.A summary of the changes...
Researchers from Bitdefender released a free master decryptor for the REvil ransomware operation that allows past victims to recover their...
Anonymous claims to have hacked the controversial web hosting provider Epik, known for allowing far-right, neo-Nazi, and other extremist content....
OMIGOD – Microsoft addressed four vulnerabilities in the Open Management Infrastructure (OMI) software agent that could expose Azure users to...
Microsoft announced that users can access their consumer accounts without providing passwords and using more secure authentication methods. Microsoft will...
Summary: An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on...
Summary: An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.5, Security...
Summary: A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari...
Summary: A code execution vulnerability exists in the DL_Dxf::handleLWPolylineData functionality of Ribbonsoft dxflib 3.17.0. A specially-crafted .dxf file can lead...
Summary: CVE-2021-31206 is a remote code execution (RCE) vulnerability impacting multiple versions of Microsoft Exchange Server. A proof of concept...
Secure Sockets Layer (SSL) certificates are what cause your browser to display a padlock icon, indicating that your connection to...
The September 2021 Patch Tuesday could be remembered as the final patching attempt in the PrintNightmare… nightmare. The ease with...
In 2020, attacks on the web accounted for one-third of all information security incidents. However, only 10% of Russian organizations...
The five-year longitudinal research conducted by cybersecurity firm Imperva revealed that nearly half of on-premises databases globally contain at least...
On Tuesday, security experts revealed data about a high-severity weakness in the HP OMEN driver software, which affects millions of...
Security experts have detected an unauthorized version of the Cobalt Strike Beacon Linux created by malicious attackers that are actively...