Security Vendors are Accused of Bending CVE Assignment Rules

Both Juniper Networks and Ivanti have attracted criticism from members of the infosec industry for the way they’ve ...

Data from Indian Online Gaming Platforms Teenpatti.com and Mpl.live on Sale

Teenpatti.com and (Mobile Premier League)Mpl.live, two prominent online gaming platforms in India, may have experienced ...

Unmasking MacOS Malware in Pirated Apps | Cyware Hacker News

Jamf Threat Labs researchers warned against pirate applications distributing a backdoor to macOS users. The researchers ...

Over 5,300 GitLab Servers Exposed to Zero-Click Account Takeover Attacks

The flaw affects several versions of GitLab and patches have already been released. The servers at risk are mainly ...

CISA adds Atlassian Confluence Data Center bug to its Known Exploited Vulnerabilities catalog – Security Affairs

CISA adds Atlassian Confluence Data Center bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January ...

Global Retailer BuyGoods.com Leaks 198GB of Internal and User PII, KYC data

The staggering 198.3 gigabytes of misconfigured database contained more than 260,000 records including customer selfies ...

How the Sys:All Loophole Allowed Us To Penetrate GKE Clusters in Production

Following our discovery of a critical loophole in Google Kubernetes Engine (GKE) dubbed Sys:All, we decided to conduct ...

Water Services Giant Veolia North America Hit by Ransomware Attack

The company has discovered a limited number of individuals whose personal information may have been impacted during the ...

1 365 366 367 368 369 370 371 372 373 374 375 658