An international joint operation resulted in the arrest of Clop ransomware members
Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an...
Ukraine police arrested multiple individuals that are believed to be linked to the Clop ransomware gang as part of an...
Summary: Running security scans against the SAN switch can cause config and secnotify processes within the firmware before Brocade Fabric...
Summary: Improper caller check vulnerability in Knox Core prior to SMR MAY-2021 Release 1 allows attackers to install arbitrary app....
Summary: The Traffic Router component of the incubating Apache Traffic Control project is vulnerable to a Slowloris style Denial of...
Summary: An improper access control vulnerability in genericssoservice prior to SMR JUN-2021 Release 1 allows local attackers to execute protected...
Summary: Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the...
Ukrainian law enforcement officials announced Wednesday that they had arrested several individuals involved in criminal activity committed by the Clop...
A billion data points, including the usernames and mobile phone numbers of customers have been siphoned off Alibaba websites by...
Twitter is potentially looking to add some new features to combat specific forms of abuse and / or aggravation on...
Following a joint operation by law enforcement agencies from Ukraine, South Korea, and the United States, multiple persons alleged to...
America's largest propane supplier, AmeriGas, has revealed a data breach that lasted ‘8-second’ but affected 123 employees and one US...
Researchers claim to have uncovered the origins of Hades ransomware's operators, as well as the unique tactics, methods, and procedures...
Japanese conglomerate Fujifilm, earlier this month on Wednesday 2nd June published a short statement to reveal the illegitimate infiltration of...
Ferocious Kitten is an APT group that since at least 2015 has been targeting Persian-speaking individuals who appear to be...
aggrokatz is an Aggressor plugin extension for CobaltStrike which enables pypykatz to interface with the beacons remotely. The current version...
Gundog provides you with guided hunting in Microsoft 365 Defender. Especially (if not only) for Email and Endpoint Alerts at...
A flaw in the Peloton Bike+ could be exploited by an attacker with initial physical access to gain root entry...
A new variant of the Mirai botnet, tracked as Moobot, was spotted scanning the Internet for vulnerable Tenda routers. Researchers...
Japanese multinational conglomerate Fujifilm announced that it has restored operations following the recent ransomware attack. On June 4, the Japanese...
The source code for the Paradise Ransomware has been released on a hacking forum allowing threat actors to develop their...
Summary: Memory leak in USB HID dissector in Wireshark 3.4.0 to 3.4.2 allows denial of service via packet injection or...
Summary: EMQ X Broker versions prior to 4.2.8 are vulnerable to a denial of service attack as a result of...
Summary: In BinderDiedCallback of MediaCodec.cpp, there is a possible memory corruption due to a use after free. This could lead...
Summary: Invision Community (aka IPS Community Suite) before 4.6.0 allows eval-based PHP code injection by a moderator because the IPS\cms\modules\front\pages\_builder::previewBlock...