CVE-2021-36367
Summary: PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response....
Summary: PuTTY through 0.75 proceeds with establishing an SSH session even if it has never sent a substantive authentication response....
Cybersecurity researchers at Canadian firm Software Secured identified a critical flaw in Less.js, a widely used preprocessor language. According to...
Financial organizations are planning to launch a pilot project of a system for accounting and analyzing telephone fraud, said Alexey...
The year 2021 will be remembered as a watershed moment for cryptocurrencies. Despite its ups and downs, Bitcoin is still...
Magecart-affiliated cybercriminals have adopted a new approach for obfuscating malware code within comment blocks and embedding stolen credit card data...
The US-based telecommunication firm Mint Mobile has announced that it has suffered a data violation which has let several telephone...
Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively...
DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS records, it uses different...
ModiPwn flaw (CVE-2021-22779) in some of Schneider Electric’s Modicon PLCs can allow attackers to bypass authentication mechanisms and take over...
NetBlocks reported partial disruption to social media and messaging platforms in Cuba from 12 July 2021 shortly after Cubans went...
American clothing brand and retailer Guess discloses a data breach after the February ransomware attack and is notifying the affected customers. In...
SolarWinds confirmed that a threat actor is actively exploiting a new zero-day vulnerability in Serv-U products and urges customers to fix it....
Researchers from Cyber News Team have spotted threat actors offering for sale 600 million LinkedIn profiles scraped from the platform,...
Summary: A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions <...
Summary: NVIDIA GeForce Experience, all versions prior to 3.23, contains a vulnerability in the login flow when a user tries...
Summary: Server-side request forgery (SSRF) in the Podcast Importer SecondLine (podcast-importer-secondline) plugin 1.1.4 for WordPress via the podcast_feed parameter in...
Summary: A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost...
Summary: A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this...
Elon Musk is an incredibly popular target for scammers and spammers on social media. Attach his name to something he...
Firefox recently announced that it will be rolling out DNS-over-HTTPS (or DoH) soon to one percent of its Canadian users...
Last week on Malwarebytes Labs: Racing against a real-life ransomware attack. Podcast with Ski Kacoroski.Kaseya CEO: “The impact of this...
Cybersecurity firm Rapid7 announced on Wednesday that it discovered four security flaws in the Sage X3 ERP software, resource, and...
CISA has released an advisory about several vulnerabilities found in Philips Vue PACS health devices. In the hands of a...
Threat actors have found a novel method for disabling macro security warnings in malspam assaults that use non-malicious documents. Microsoft...