German Company Hit By Supply Chain Attack, Only Few Device Affected
Gigaset, a German device maker, was recently hit with a supply chain attack, the hackers breached a minimum of one...
Gigaset, a German device maker, was recently hit with a supply chain attack, the hackers breached a minimum of one...
 Security researchers have noted an increase in the misuse of legitimate services such as Google Forms and Telegram for gathering...
Maximizing BloodHound.DescriptionNew Release: dpat - The BloodHound Domain Password Audit Tool (DPAT) A simple suite of tools: get-info - Pull...
NtHiM - Super Fast Sub-domain Takeover DetectionInstallationMethod 1: Using Pre-compiled BinariesThe pre-compiled binaries for different systems are available in the...
The following blog was co-authored by Caitlin Condon and Bob Rudis, also known (in his own words) as “some caveman...
In a previous article, we described how the usage of namespaces in Kubernetes significantly simplifies the management of a Kubernetes...
This blog post was co-authored by Jamie Gale and Charles Stokes. Done with Q1The DivvyCloud by Rapid7 team has had...
Group-IB, a global threat hunting and adversary-centric cyber intelligence company, discovered that user data of the Swarmshop card shop have been leaked...
Pwn2Own 2021 – Day 2: a security duo earned $200,000 for a zero-interaction Zoom exploit allowing remote code execution. One...
Days after a massive Facebook data leak made the headlines, 500 million LinkedIn users are being sold online, seller leaked 2 million...
Cisco has addressed a critical pre-authentication remote code execution (RCE) vulnerability in the SD-WAN vManage Software. Cisco has addressed multiple...
The maintainers of the PHP programming language confirmed that threat actors may have compromised a user database containing their passwords....
A joint operation of Europol and the Italian Postal and Communication Police resulted in the arrest of an Italian national...
Summary: An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security...
Summary: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 14.3, macOS Big...
Summary: In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon...
Summary: This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001...
Summary: An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 14.3, macOS Big Sur...
A timely warning to keep systems patched has appeared, via a jointly-released report from Onapsis and SAP. The report details...
 Researchers have discovered malware camouflaged as a Netflix application, prowling on the Google Play store, spread through WhatsApp messages. As...
Sierra Wireless, a Canadian IoT solutions provider said that it has reopened its manufacturing site's production after the company suffered...
 Just days after a Facebook data leak was revealed, security experts have discovered another one, this time the victim being...
In January, Andrei Tyurin was sentenced to 12 years in prison for the largest theft of personal data of bank...
 A banking Trojan has been found out by cybersecurity researchers, which has targeted many organizations across the state of Brazil....