Ferrari has disclosed a data breach following a ransom demand received after attackers gained access to some of the company’s…
Windows 11 users report seeing widespread Windows Security warnings that Local Security Authority (LSA) Protection has been disabled even though…
Impact When using –userns-remap, if the root user in the remapped namespace has access to the host filesystem they can…
Threat actors are targeting and infecting .NET developers with cryptocurrency stealers delivered through the NuGet repository and impersonating multiple legitimate…
Compromising an unreachable Solr server with CVE-2013-6397 I recently did a pentest where I compromised a Solr server located several…
File-sharing site Zippyshare has announced they are shutting down the site by the end of March 2023 after announcing they…
The botnet is based on the Mirai botnet, and since it is actively updated, the new versions have additional features…
Amazon CEO Andy Jassy has confirmed that its cloud division will be affected by its next round of job cuts,…
The Wallarm Detect team has found exploit attempts in the wild of CVE-2022-31678 and CVE-2021-39144. The original vulnerabilities were found…
Hackers continue to target zero-day vulnerabilities in malicious campaigns, with researchers reporting that 55 zero-days were actively exploited in 2022,…
The security analysts at Akamai recently identified a new botnet called HinataBot, based on Golang. Apart from this, HinataBot has…
The cryptocurrency market is extremely volatile. The unpredictable nature is both good and bad for traders and investors. Regardless of…