CVE-2020-36625
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in destiny.gg chat. It has been rated as problematic. This issue affects the function websocket.Upgrader of...
CVE-2020-36624
A vulnerability was found in ahorner text-helpers 1.1.0/1.1.1. It has been declared as critical. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation...
How Marvel’s Avengers inspire Pinsent Masons CISO to adapt cybersecurity hiring
Cybersecurity’s ongoing battle with a “skills shortage” has seen the sector lose its way regarding talent hiring and retention, says Christian Toon, CISO at London-based...
UK Government: Sharing Some Passwords is Illegal
Intellectual Property Office says it breaks copyright law Read More
Ransomware Attack Hits The Guardian Newspaper
Staff told to work from home after compromise Read More
Researchers Develop AI-powered Malware Classification for 5G-enabled IIoT
A team of researchers came up with an ingenuous method leveraging AI to detect and classify malware in IIoT devices Read More
ZDI-22-1687: Linux Kernel ksmbd Memory Exhaustion Denial-of-Service Vulnerability
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability. Read...
ZDI-22-1688: Linux Kernel ksmbd Heap-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is required to exploit this vulnerability. Read More
ZDI-22-1689: Linux Kernel ksmbd Out-Of-Bounds Read Denial-of-Service Vulnerability
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Linux Kernel. Authentication is required to exploit this vulnerability. Read More
ZDI-22-1690: Linux Kernel ksmbd Use-After-Free Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Linux Kernel. Authentication is not required to exploit this vulnerability. Read More