ESET releases fixes for local privilege escalation bug in Windows Applications
Antivirus firm ESET addressed a local privilege escalation vulnerability, tracked CVE-2021-37852, impacting its Windows clients. Antivirus firm ESET released security...
Antivirus firm ESET addressed a local privilege escalation vulnerability, tracked CVE-2021-37852, impacting its Windows clients. Antivirus firm ESET released security...
The Cybereason Nocturnus Team reported a spike in the activity of the Iran-linked APT group APT35 (aka Phosphorus or Charming Kitten). The Cybereason...
Svchost is essential in the implementation of so-called shared service processes, where a number of services can share a process...
Researchers discovered tens of vulnerabilities in UEFI firmware code used by the major device manufacturers. Researchers at firmware security company...
A massive social engineering campaign targeting banks has been delivered in the last two years in several countries. A massive...
This Python script can be used to bypass IP source restrictions using HTTP headers. Features 17 HTTP headers. Multithreading. JSON...
Personal information belonging to British Council students was exposed online via an unsecured repository. The British Council is a British...
German petrol distributor Oiltanking GmbH was a victim of a cyberattack that has a severe impact on its operations. A...
The Iran-linked MuddyWater APT group is targeting private Turkish organizations and governmental institutions. Researchers from Cisco Talos have uncovered a...
Development Status rathole is under active development. A load of features is on the way: TLS support UDP support Hot...
A critical RCE in the popular WordPress plugin Essential Addons for Elementor impacts hundreds of thousands of websites. Essential Addons...
Samba fixes a critical flaw, tracked as CVE-2021-44142, that can allow remote attackers to execute code with root privileges. Samba has...
The US CISA added eight more flaws to its Known Exploited Vulnerabilities Catalog that are known to be used in...
You can already find plenty of solutions to recover deleted files, but it can be a hassle to recover overwritten...
A hacking campaign, tracked as Eternal Silence, is abusing UPnP to compromise routers and use them to carry out malicious...
Threat actors stole $80M worth of cryptocurrency from the Qubit DeFi platform by exploiting a flaw in the smart contract...
The administrator of the DeepDotWeb (DDW) has received a sentence of 97 months in prison for money laundering. Tal Prihar...
Apple paid +$100K bounty for a macOS series of flaws that can allow threat actors to take over the microphone...
Bluffy is a utility which was used in experiments to bypass Anti-Virus products (statically) by formatting shellcode into realistic looking...
A report from the US Federal Trade Commission (FTC) revealed that in 2021 Americans lost $770 million from social media...
A new hacking campaign, tracked as ‘OiVaVoii’, is targeting company executives with malicious OAuth apps. Researchers from Proofpoint have uncovered...
An script to perform kerberos bruteforcing by using the Impacket library. When is executed, as input it receives a user...
A researcher disclosed an exploit for a Windows local privilege elevation issue (CVE-2022-21882) that allows anyone to gain admin privileges...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...