Microsoft Outlook spoofing | CVE-2023-36893
NAME__________Microsoft Outlook spoofingPlatforms Affected:Microsoft Outlook 2016 x32 Microsoft Outlook 2016 x64 Microsoft Outlook 2013 SP1 x32 Microsoft Outlook 2013 SP1...
NAME__________Microsoft Outlook spoofingPlatforms Affected:Microsoft Outlook 2016 x32 Microsoft Outlook 2016 x64 Microsoft Outlook 2013 SP1 x32 Microsoft Outlook 2013 SP1...
NAME__________Microsoft Windows Message Queuing denial of servicePlatforms Affected:Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows 10 x32...
NAME__________Microsoft Dynamics Business Central privilege escalationPlatforms Affected:Microsoft Dynamics 365 Business Central 2023 Release Wave 1Risk Level:7.2Exploitability:UnprovenConsequences:Gain Privileges DESCRIPTION__________Microsoft Dynamics Business...
NAME__________Multiple Intel Processors information disclosurePlatforms Affected:Intel Processor familiesRisk Level:6.5Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Multiple Intel Processors could allow a local authenticated attacker to...
NAME__________Microsoft Windows Kernel privilege escalationPlatforms Affected:Microsoft Windows 10 x32 Microsoft Windows Server 2016 Microsoft Windows Server 2019 Microsoft Windows 10...
Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular...
Microsoft has patched a total of 74 flaws in its software as part of the company's Patch Tuesday updates for...
Daily Vulnerability Trends (sourced from VulnMon) CVE NAMECVE DescriptionCVE-2023-39526PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10,...
Spotlight on shadow IT ‘Shadow IT’ (also known as ‘grey IT’) is the name given to those unknown IT assets...
To SOC or not to SOC ? So, you are implementing a large digital project, and have followed the GOV.UK...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes...
The Colorado Department of Higher Education (CDHE) discloses a massive data breach impacting students, past students, and teachers after suffering...
The Clop ransomware gang has once again altered extortion tactics and is now using torrents to leak data stolen in...
Hackers are increasingly abusing the legitimate Cloudflare Tunnels feature to create stealthy HTTPS connections from compromised devices, bypass firewalls, and...
Researchers from the Technical University of Berlin have developed a method to jailbreak the AMD-based infotainment systems used in all...
The UK Electoral Commission disclosed a massive data breach exposing the personal information of anyone who registered to vote in...
The North Korean state-sponsored hacking group ScarCruft has been linked to a cyberattack on the IT infrastructure and email server...
The Google Play store was infiltrated by 43 Android applications with 2.5 million installs that secretly displayed advertisements while a...
A senior research scientist at Google has devised new CPU attacks to exploit a vulnerability dubbed Downfall that affects multiple...
A joint operation between Interpol and cybersecurity firms has led to an arrest and shutdown of the notorious 16shop phishing-as-a-service...