Expert found a critical remote code execution bug in Linux Kernel
A critical heap-overflow vulnerability, tracked as CVE-2021-43267, in Linux Kernel can allow remote attackers to takeover vulnerable installs. A SentinelOne...
A critical heap-overflow vulnerability, tracked as CVE-2021-43267, in Linux Kernel can allow remote attackers to takeover vulnerable installs. A SentinelOne...
The US DoJ charged the suspected Twitter hacker ‘PlugWalkJoe’ with the theft of $784,000 worth of cryptocurrency using SIM swap attacks....
The US CISA shared a list of vulnerabilities known to be exploited in the wild and orders US federal agencies...
CERT-France warns of a new ransomware group named Lockean that is behind a series of attacks against French organizations over...
The U.K. Labour Party discloses a data breach after a ransomware attack hit a service provider that is managing its...
Cyber Defense Magazine September 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with 155 pages of excellent...
The U.S. sanctioned four companies for the development of surveillance malware or the sale of hacking tools used by nation-state...
This blog post was authored by Jérôme Segura There are many techniques threat actors use to slow down analysis or,...
In a security advisory, Mozilla’s announced that several security issues in its Firefox browser have been fixed. Several of these...
Researchers at the University of Cambridge, UK, have released details of a cunning and insidious new class of software vulnerability...
The BlackMatter ransomware gang has announced they are going to shut down their operation, citing pressure from local authorities. And...
Experts warn of the availability in the cybercrime underground of offers for initial access to networks of players in global...
The BlackMatter ransomware gang announced it is going to shut down its operation due to pressure from law enforcement. The...
Google’s Android November 2021 security updates address a zero-day vulnerability in the Kernel that is actively exploited in the wild....
Weeks ago, we talked about the one effective lure that could get a Discord user to consider clicking on a...
Facebook announced to shut down its Face Recognition system and is going to delete over 1 billion people’s facial recognition...
The FBI warns of ransomware attacks on businesses involved in “time-sensitive financial events” such as corporate mergers and acquisitions. The Federal...
The news is currently jam-packed with tales of Facebook’s Meta project. Of particular interest to me is Facebook’s long-stated desire...
Google has issued security patches for the Android Operating System. In total, the patches address 39 vulnerabilities. There are indications...
Google is going to increase the bounty for finding and exploiting privilege escalation vulnerabilities in the Linux kernel. Good news...
Researchers warn of a now-fixed critical remote code execution (RCE) vulnerability in GitLab ‘s web interface actively exploited in the...
Twitch is primarily a site dedicated to live streaming content. It also offers the ability to chat with others in...
Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software...
What browser do you use? There’s a good chance—roughly one in seven—that it’s Google Chrome. And even if you prefer...