CVE-2021-29942
Summary: An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index can return uninitialized values if an...
Summary: An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index can return uninitialized values if an...
Summary: An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index has an out-of-bounds write if an...
Summary: An issue was discovered in the slice-deque crate through 2021-02-19 for Rust. A double drop can occur in SliceDeque::drain_filter...
Summary: An issue was discovered in the arenavec crate through 2021-01-12 for Rust. A double drop can sometimes occur upon...
Last week on Malwarebytes Labs, our podcast featured Malwarebytes senior security researcher JP Taggart, who talked to us about why you need...
Vuln Impact This vulnerability allows for unauthenticated attackers with network access to the iControl REST interface, through the BIG-IP management...
Several weeks ago, the Conti ransomware gang encrypted the systems at Broward County Public Schools and took steps to release...
Microsoft released the BITS (Background Intelligent Transfer Service) in Windows XP to coordinate and ease uploading and downloading files with...
An unintelligible tweet sent out from the official account of U.S. Strategic Command in charge of the nation’s nuclear arsenal...
The popular beer brands producers in the United States such as Molson Canadian, Coors Light, Miller Lite, Carling, Blue Moon,...
A major privacy violation by hackers allegedly took the data of almost 533 million users of Facebook from 106 countries...
Introduction In the nebula of Chinese-speaking threat actors, it is quite common to see tools and methodologies being shared. One...
UAC is a Live Response collection tool for Incident Response that makes use of built-in tools to automate the collection...
The Commissioner Jules Maigret is a fictional French police detective, created by Georges Simenon. His investigation method is based on...
The cloud security solutions market is growing rapidly, and there are many types of solutions to support your specific business...
Log data is critical to ensuring that you have full visibility into what’s going on across your environment. Alongside endpoint...
2021 is off and running! The big question on the corporate world’s mind is, of course, “What will work life...
You can check if your personal information is included in the Facebook data leak by querying the data breach notification...
H2 2020 – Kaspersky observed an increase in ransomware attacks on industrial control system (ICS) systems in developed countries. Cybersecurity...
A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. Microsoft recently...
Summary: There's a flaw in OpenEXR in versions before 3.0.0-beta. A crafted input file that is processed by OpenEXR could...
Summary: An out-of-bounds write vulnerability exists in the TIFF header count-processing functionality of Accusoft ImageGear 19.8. A specially crafted malformed...
Summary: Mozilla developers reported memory safety bugs present in Firefox 86. Some of these bugs showed evidence of memory corruption...
Summary: Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of...