Video Game Publisher Admits Helpdesk Was Hijacked
Players were sent malicious links disguised as support tickets Read More
Top 5 attack surface challenges related to security operations
According to newly published ESG research, just over half of all organizations (52%) say that security operations are more difficult today than they were two...
Open Source Repository Attacks Soar 700% in Three Years
Sonatype says it has detected 95,000 since 2019 Read More
ZDI-22-1295: Apple macOS TIFF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the CoreGraphics framework is required to exploit this...
DSA-5233 e17 – security update
Maher Azzouzi discovered that missing input sanitising in the Enlightenment window manager may result in local privilege escalation to root. Read More
DSA-5234 fish – security update
An arbitrary code execution vulnerability was disovered in fish, a command line shell. When using the default configuraton of fish, changing to a directory automatically...
DSA-5232 tinygltf – security update
It was discovered that the wordexp() function of tinygltf, a library to load/save glTF (GL Transmission Format) files was susceptible to command execution when processing...
CVE-2021-46834
A permission bypass vulnerability in Huawei cross device task management could allow an attacker to access certain resource in the attacked devices. Affected product versions...
CVE-2020-36602
There is an out-of-bounds read and write vulnerability in some headset products. An unauthenticated attacker gets the device physically and crafts malformed message with specific...
Ransomware is (slightly) on the decline, cyberinsurance company says
Ransomware attacks began to become both less common and less costly in the first half of 2022, as payments to attackers and the number of...