Avaddon ransomware gang shuts down their operations and releases decryption keys
The Avaddon ransomware gang has shut down its operations and released the decryption keys to allow victims to recover their...
The Avaddon ransomware gang has shut down its operations and released the decryption keys to allow victims to recover their...
The current era, where all data is digital, the threats of fraud, breach and data sprawl are more of a...
Italy announced the creation of the national cybersecurity agency, a move aimed at increase the level of cyber security of...
Summary: Microsoft Defender Remote Code Execution Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31985 CVSS Score (if available) v2: / MEDIUMAV:N/AC:M/Au:N/C:P/I:P/A:P v3: /...
Summary: ** DISPUTED ** Unbound before 1.9.5 allows an assertion failure and denial of service in synth_cname. NOTE: The vendor...
Summary: ** DISPUTED ** Unbound before 1.9.5 allows an assertion failure and denial of service in dname_pkt_copy via an invalid...
Summary: ** DISPUTED ** Unbound before 1.9.5 allows an infinite loop via a compressed name in dname_pkt_copy. NOTE: The vendor...
Summary: ** DISPUTED ** Unbound before 1.9.5 allows an assertion failure via a compressed name in dname_pkt_copy. NOTE: The vendor...
People worldwide use Facebook to connect with friends and family, and to engage in pointless debates with strangers over moderately...
Thanks to the vast rollout of COVID-19 vaccines to millions of people in the US and Europe, some of us...
An authentication bypass vulnerability in the polkit auth system service, which is installed by default on many recent Linux distributions,...
On Thursday, cyber-security researchers in India announced the discovery of a malicious free present marketing campaign managed by China-based hackers...
GitHub recently updated its insights to include repositories that contain registry secrets for PyPI and RubyGems. This approach protects millions...
The Dutch newspaper Volkskrant on the day of the start of the hearing on the crash of the Malaysian Boeing...
The FBI has issued a warning to private sector enterprises about scammers masquerading construction companies in business email compromise (BEC)...
Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external...
Cyber Range deployment of HELK and Velociraptor! Automated terraform deployment of one system running HELK + Velociraptor server with one...
Experts spotted a new mysterious malware that was used to collect a huge amount of data, including sensitive files, credentials,...
Qatari government-funded international Arabic news channel Al Jazeera announced to have blocked a series of disruptive cyberattacks aimed at its...
The US Department of Justice seized the servers and domains of the popular cybercrime marketplace SlilPP. The US Department of Justice...
Threat hunting and adversarial cyber intelligence company Group-IB published a comprehensive analysis of fraud cases on a global scale. Group-IB, a...
Hackers breached the network of the gaming giant Electronic Arts (EA) and have stolen roughly 780 GB of data, including game...
Summary: There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted...
Summary: Deserialization of untrusted data vulnerability in McAfee Database Security (DBSec) prior to 4.8.2 allows a remote authenticated attacker to...