A flaw in the GitHub Actions workflow for PyPI ’s source repository could be exploited to potentially execute arbitrary code…
Did you ever stop to think that the office smart TV used for company presentations, Zoom meetings, and other work-related…
Cybersecurity researchers disclosed multiple flaws, dubbed PwnedPiper, that left a widely-used pneumatic tube system (PTS) vulnerable to attacks. Researchers from…
An attacker could exploit a vulnerability in the WordPress Download Manager plugin, tracked as CVE-2021-34639, to execute arbitrary code under…
Kaspersky experts spotted a previously undocumented Chinese-speaking threat actor, tracked as GhostEmperor, that is targeting Microsoft Exchange flaws in attacks…
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure…
Microsoft Office 365 email accounts of employees at 27 US Attorneys' offices were breached by the Russia-linked SVR group as part of…
Experts spotted a new strain of Android banking Trojan dubbed Vultur that uses screen recording and keylogging for the capturing…
Researcher published an exploit code for a high-severity privilege escalation flaw (CVE-2021-3490) in Linux kernel eBPF on Ubuntu machines. The…
This website uses cookies.