Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
NAME__________Golang Go information disclosurePlatforms Affected:Golang Go 1.19.5Risk Level:5.9Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Golang Go could allow a remote attacker to obtain sensitive information,...
NAME__________Phoenix Technologies Phoenix SecureCore code executionPlatforms Affected:Phoenix Technologies Phoenix SecureCoreRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Phoenix Technologies Phoenix SecureCore could allow a local...
NAME__________git-urls denial of servicePlatforms Affected:git-urls git-urls 1.0.0Risk Level:7.5Exploitability:Proof of ConceptConsequences:Denial of Service DESCRIPTION__________git-urls is vulnerable to a denial of service,...
NAME__________Insyde InsydeH2O denial of servicePlatforms Affected:Insyde InsydeH2O 5.2 Insyde InsydeH2O 5.3 Insyde InsydeH2O 5.4 Insyde InsydeH2O 5.5 Insyde InsydeH2O 5.6Risk...
NAME__________Apple macOS Sonoma code executionPlatforms Affected:Apple macOS SonomaRisk Level:7.8Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Apple macOS Sonoma could allow a remote attacker to execute...
NAME__________AMI Aptio V code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI Aptio V could allow a local authenticated attacker to...
NAME__________Devolutions Workspace information disclosurePlatforms Affected:Devolutions Devolutions Workspace 2023.3.2.0Risk Level:4.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Devolutions Workspace could allow a remote authenticated attacker to obtain...
NAME__________EspoCRM server-side request forgeryPlatforms Affected:EspoCRM EspoCRM 8.0.4Risk Level:5.3Exploitability:Proof of ConceptConsequences:Gain Access DESCRIPTION__________EspoCRM is vulnerable to server-side request forgery, caused by...
NAME__________AMI AptioV code executionPlatforms Affected:AMI Aptio VRisk Level:7.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________AMI AptioV could allow a local authenticated attacker to execute arbitrary...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
This week, we focus on one of the critical aspects of Cyber Security - Network Security. As we sail into...
Security researchers developed a new attack, which they named AutoSpill, to steal account credentials on Android during the autofill operation....
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of...
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part of...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...
HIBP In February 2021, the Indian streaming platform Gemplex suffered a data breach that exposed 4.6M user accounts. The impacted...
HIBP In July 2016, now defunct website Kaneva, the service to "build and explore virtual worlds", suffered a data breach...
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with a new Trojan-Proxy...