CVE-2021-21659
Summary: Jenkins URLTrigger Plugin 0.48 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks....
Summary: Jenkins URLTrigger Plugin 0.48 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks....
Summary: A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix...
FireEye Mandiant, working in in tandem with the Cybersecurity and Infrastructure Security Agency and Ivanti, reported details of 16 malware...
On the 14th of May, the Health Service Executive (HSE), Ireland’s publicly funded healthcare system, fell victim to a Conti...
Nobelium is a synthetic chemical element with the symbol No and atomic number 102. It is named in honor of...
Cybercriminals have breached the offices of multiple Japanese agencies by hacking into Fujitsu’s software-as-a-service (SaaS) platform and gaining access to...
Siemens published a consumer notice on Tuesday 25th of May concerning several serious vulnerabilities impacting its Solid Edge product. The...
Dubai appears to have developed its own cryptocurrency, known as the DubaiCoin (DBIX). It is established on a public blockchain,...
EDR function hook dumping Please refer to the Zeroperil blog post for more information https://zeroperil.co.uk/hookdump/Building sourceIn order to build this...
subdomains by looking at Google Analytics IDs > Python/GO versions > By @JosueEncinar ">> Get related domains / subdomains by...
Researchers from FireEye warn that China-linked APT groups continue to target Pulse Secure VPN devices to compromise networks. Cybersecurity researchers...
Microsoft experts uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind SolarWinds hack. Microsoft Threat Intelligence...
Canada Post disclosed a ransomware attack on a third-party service provider that exposed shipping information for their customers. Canada Post...
The FBI revealed that foreign hackers compromised the network of a local US municipal government by exploiting flaws in an...
The US Department of Homeland Security (DHS) has announced new cybersecurity requirements for critical pipeline owners and operators. The Colonial pipeline...
Summary: NVIDIA vGPU driver contains a vulnerability in the guest kernel mode driver and Virtual GPU Manager (vGPU plugin), in...
Summary: NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where there is the potential to...
Summary: A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco...
Summary: NVIDIA Windows GPU Display Driver for Windows, R390 driver branch, contains a vulnerability in its installer where an attacker...
Summary: The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression...
An aerial view of a wastewater treatment plant in California. An attempt to poison the Oldsmar, Florida water supply by...
As cybersecurity products evolve to better protect against new forms of malware, trickier evasion techniques, and more organized cybercrime campaigns,...
The Portable Document Format (PDF) file type is one of the most common file formats in use today. It’s value...
Healthcare and ransomware are in the news in a big way. Data leaks are inevitable, but those are typically associated...