Korean Dating App Leaks Private Images and Information of 1 Million Users
Korea is a country where incidents of data breach have significantly risen in number, becoming the new normal. Due to...
Korea is a country where incidents of data breach have significantly risen in number, becoming the new normal. Due to...
Online survey and form creation tool Typeform allows clients to make website pages for easy information gathering from clients. Each...
ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses.DescriptionThis tool can help you in...
sigurls is a reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine.UsageTo display...
This update is a continuation of our previous coverage of the SolarWinds supply-chain attack that was discovered by FireEye in...
Cybersecurity firm CrowdStrike announced to have discovered a third malware strain, named Sunspot, directly involved in the SolarWinds supply chain...
Security firm Bitdefender released a tool that allows victims of the Darkside ransomware to recover their files without paying the...
American technology company Ubiquiti Networks is disclosed a data breach and is notifying its customers via email. American technology vendor...
Experts have found some similarities between the Sunburst backdoor used in the SolarWinds supply chain attack and Turla’s backdoor Kazuar. Security experts...
Summary: Heap buffer overflow in audio in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially exploit heap...
Summary: Race in image burner in Google Chrome on ChromeOS prior to 87.0.4280.66 allowed a remote attacker who had compromised...
Summary: The AES encryption project 7.x and 8.x for Drupal does not sufficiently prevent attackers from decrypting data, aka SA-CONTRIB-2017-027....
Summary: The Application Wrapper in Pearson VUE VTS Installer 2.3.1911 has Full Control permissions for Everyone in the "%SYSTEMDRIVE%\Pearson VUE"...
Summary: An issue was discovered in Veritas APTARE 10.4 before 10.4P9 and 10.5 before 10.5P3. By default, on Windows systems,...
Last week on Malwarebytes Labs, we released survey results about VPN usage and found that 36 percent of our respondents...
Arrrrgh, Bug Bounty! Slack Webhook If the below command returns missing_text_or_fallback_or_attachments, it means that the URL is valid, any other responses...
JetBrains a software company based in the Czech Republic could possibly be used as a doorway by Russian hackers to...
Phishing emails are scams where the actors try to befool the user by sending emails that may concern the user....
Launched in 2018, Parler has become a place of refuge for individuals that have been prohibited or suspended by popular...
Introduction On December 13, 2020, FireEye published a blog post detailing a supply chain attack leveraging Orion IT, an infrastructure...
A pre-boot execution environment for Apple boards built on top of checkra1n.Building on macOSInstall Xcode + command-line utilities make clean...
Hello! Welcome. Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go.Notice:Why is the project...
A U.S. court on Thursday sentenced the Russian hacker Andrei Tyurin to 12 years in prison for his role in...
Researchers obtained gained access to the Git Repositories belonging to the United Nations, exposing staff records and credentials. The research...