Phishing Email [[email protected]]

Another day, and another inbox full of spam. This one caught our eye ([email protected]) so we thought we would share

Read more

MoviePass database found exposed on public server

TechCrunch reported on Tuesday that Mossab Hussein, a security researcher at Dubai-based cybersecurity firm SpiderSilk, recently stumbled across a massive

Read more

VBShower PowerShell Backdoor

VBShower is a new PowerShell-based polymorphic backdoor, created by the Inception advanced persistent threat group to replace their older PowerShower

Read more

Product Recall – 15-Inch Apple MacBook Pro Battery

Apple is recalling certain older Apple 15-inch MacBook pro laptops due to battery issues.  Product battery may overheat and pose

Read more

Now You Can See and Control the Data That Apps and Websites Share With Facebook

Many apps and websites are free because they’re supported by online advertising. And to reach people who are more likely

Read more

PostgreSQL EnterpriseDB Windows Installer Bundled OpenSSL Code Execution Vulnerability [CVE-2019-10211]

CVE number – CVE-2019-10211 A vulnerability in PostgreSQL could allow a local attacker to execute arbitrary code on a targeted

Read more

Zstandard one-pass compression Functions Race Condition Vulnerability [CVE-2019-11922]

CVE number – CVE-2019-11922 A vulnerability in Zstandard could allow an unauthenticated, remote attacker to execute arbitrary code or cause

Read more

Windows ALPC Elevation of Privilege Vulnerability [CVE-2019-1162]

CVE Number – CVE-2019-1162 An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call

Read more

fstream fstream.DirWriter() Function Arbitrary File Overwrite Vulnerability [CVE-2019-13173]

CVE number – CVE-2019-13173 A vulnerability in fstream could allow an unauthenticated, remote attacker to overwrite arbitrary files on a

Read more

KDE Frameworks KConfig Code Execution Vulnerability [CVE-2019-14744]

CVE number – CVE-2019-14744 A vulnerability in KDE Frameworks KConfig could allow an unauthenticated, remote attacker to execute arbitrary code

Read more
%d bloggers like this: