USCellular Hit by a Data Breach After Hackers Access CRM Software
 US Cellular, which is a mobile network operator, has suffered a data breach after threat actors gained access to...
 US Cellular, which is a mobile network operator, has suffered a data breach after threat actors gained access to...
 Cybersecurity experts have discovered an updated version of ‘Pro-Ocean malware’, this malware was used as a weapon by a cybercriminal...
 DDoS- Distributed Denial of Service is a cyber attack on a specific server or network. It attempts to disrupt the...
 A "persistent attacker group" with supposed connections to Hezbollah has retooled its malware arsenal with a new version of a...
This is "flawfinder" by David A. Wheeler. Flawfinder is a simple program that scans C/C++ source code and reports potential...
Fast Modular Web Interfaces BruteforcerInstallpython3 -m pip install -r requirements.txt Usage$ python3 web-brutator.py -h __ __ ___. __________ __ __...
Cyber-espionage and exploitation from nation-state-sanctioned actors have only become more prevalent in recent years, with recent examples including the SolarWinds...
Organizations around the globe continue to embrace the flexibility, speed, and agility of the cloud. Those that have adopted it...
Researchers from the security firm NCC Group warn of the exploitation in the wild of a SonicWall zero-day vulnerability. Security...
Google discovered a flaw in GNU Privacy Guard (GnuPG)’s Libgcrypt encryption library that could be exploited to get remote code...
Expert disclosed an unpatched vulnerability in Microsoft Azure Functions that could be exploited to escape the Docker container hosting them....
Summary: A Cross-Site Request Forgery (CSRF) vulnerability exists in Star Practice Management Web version 2019.2.0.6, allowing an attacker to change...
Summary: It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that it was possible for site administrators...
Summary: Sensitive information disclosure and weak encryption in Pyrescom Termod4 time management devices before 10.04k allows remote attackers to read...
Summary: HedgeDoc is open source software which lets you create real-time collaborative markdown notes. In HedgeDoc before version 1.7.2, an...
Summary: Arbitrary read and write to kernel addresses by temporarily overwriting ring buffer pointer and creating a race condition. in...
In October 2020, the online photo editing application Pixlr suffered a data breach exposing 1.9 million subscribers. Impacted data included...
January 28 was Data Privacy Day, but for Malwarebytes Labs, it was Data Privacy Week. As such, we’re packed with...
 Security expert Lucas Stefanko unearthed the malware known as ‘Android Worm’. Threat actors are using this malware as a weapon...
 Last year, Apple rolled out iOS 14 with many new features, tighter privacy laws, and elements that make the iPhone...
MOSE is a post exploitation tool that enables security professionals with little or no experience with configuration management (CM) technologies...
OpenCVE, formerly known as Saucs, is a platform used to locally import the list of CVEs and perform searches on...
Experts from Great Firewall Report analyzed recent upgrades to China’s Great Firewall and revealed that it can be circumvented. Members...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...