ZDI-22-582: Schneider Electric SCADAPack Workbench isasln File Parsing XML External Entity Processing Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Schneider Electric SCADAPack Workbench. User interaction is required to exploit this vulnerability...
ZDI-22-583: Schneider Electric SCADAPack Workbench isasln File Parsing XML External Entity Processing Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Schneider Electric SCADAPack Workbench. User interaction is required to exploit this vulnerability...
ZDI-22-547: (0Day) (Pwn2Own) Samsung Galaxy S21 Exposed Dangerous Method Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to execute arbitrary code on affected installations of Samsung Galaxy S21 phones. An attacker must first obtain the ability to...
Post Title
A vulnerability has been discovered in Google Chrome that could allow for arbitrary code execution. Google Chrome is a web browser used to access the...
What is a botnet? When infected devices attack
Botnet definition A botnet is a collection of internet-connected devices that an attacker has compromised to carry out DDoS attacks and other tasks as a...
CVE-2020-28062
An Access Control vulnerability exists in HisiPHP 2.0.11 via special packets that are constructed in $files = Dir::getList($decompath. '/ Upload/Plugins /, which could let a...
Jail Releases 300 Suspects Due to Computer “Glitch”
Outage caused by system update disrupts processing of defendants in Texas county Read More
Fortinet tightens integration of enterprise security, networking controls
Fortinet adds new security, SD-WAN, branch, and zero-trust capabilities to FortiOS software. Read More
Cadbury Warns of Easter Egg Scam
Cyber-criminals target sweet-toothed consumers with fake Easter Egg hunt scam Read More
The Russian cyberattack threat might force a new IT stance
With the threat of Russian cyberattacks still with us, companies need to be on a war footing when it comes to security. Read More