USN-5371-1: nginx vulnerabilities
It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to perform an HTTP Request Smuggling attack. This...
CVE-2021-32040
It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the...
Ethical Hacker Steals $600,000 Worth of Crypto
Daniel Motta reportedly stole elderly client’s Trezor hardware wallet and its password while providing security help Read More
Post Title
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged...
John Oliver on Data Brokers
John Oliver has an excellent segment on data brokers and surveillance capitalism. Read More
RaidForums Hacker Marketplace Shut Down in Cross-Border Law Enforcement Operation
RaidForums has been shut down and its infrastructure seized in a joint law enforcement operation coordinated by Europol Read More
Serious flaws allow the hijacking of autonomous logistics robots used in hospitals
Organizations are adopting IoT solutions to automate repetitive and time-consuming tasks in their facilities and hospitals are no different. While robots and other devices can...
Consumers Increasingly Numb to Data Breach Risks
Trust in organizations hits rock bottom but many don’t care Read More
99% of cloud identities are overly permissive, opening door to attackers
Almost all cloud users, roles, services, and resources grant excessive permissions leaving organizations vulnerable to attack expansion in the event of compromise, a new report...
What is data fabric and how does it impact Cybersecurity?
This blog was written by an independent guest blogger. Amidst sweeping digital transformation across the globe, numerous organizations have been seeking a better way to...