lets

AutomatedLab – A Provisioning Solution And Framework That Lets You Deploy Complex Labs On HyperV And Azure With Simple PowerShell Scripts

AutomatedLab (AL) enables you to setup test and lab environments on Hyper-v or Azure with multiple products or just a… Read More

3 years ago

A New Vulnerability Found in Apple’s macOS Finder Lets Attackers Run Commands Remotely

New macOS zero-day bug lets attackers run commands remotely A new vulnerability in Apple’s macOS Finder was revealed today, allowing… Read More

3 years ago

Razer bug lets you become a Windows 10 admin by plugging in a mouse

A Razer Synapse zero-day vulnerability has been disclosed on Twitter, allowing attackers to gain Windows admin privileges simply by plugging… Read More

3 years ago

SynAck ransomware decryptor lets victims recover files for free

Emsisoft has released a decryptor for the SynAck Ransomware, allowing victims to decrypt their encrypted files for free. As part… Read More

3 years ago

New PetitPotam NTLM Relay Attack Lets Hackers Take Over Windows Domains

A newly uncovered security flaw in the Windows operating system can be exploited to coerce remote Windows servers, including Domain… Read More

3 years ago

Tool lets users supplement ATT&CK knowledge base with their own intel

The research and development division of Mitre Engenuity launched a tool that allows organizations to integrate their own proprietary threat… Read More

3 years ago

Inside the Market for Cookies That Lets Hackers Pretend to Be You

Genesis Market is an invite-only underground marketplace where cybercriminals can source cookies that have been lifted from hacked computers for… Read More

3 years ago

pyWhat – Identify Anything. Easily Lets You Identify Emails, IP Addresses, And More…

The easiest way to identify anything pip3 install pywhat && pywhat --helpWhat is this? Imagine this: You come across some… Read More

3 years ago

Linux system service bug lets you get root on most modern distros

Unprivileged attackers can get a root shell by exploiting an authentication bypass vulnerability in the polkit auth system service installed… Read More

3 years ago

Foxit Reader bug lets attackers run malicious code via PDFs

Foxit Software, the company behind the highly popular Foxit Reader, has published security updates to fix a high severity remote… Read More

3 years ago

WhatsApp flaw lets anyone lock you out of your account

The underlying loophole abuses a lapse in security of two independent WhatsApp processes, according to Forbes, which quoted research by… Read More

3 years ago

Let’s Talk About NimzaLoader, the New Malware in Town

This malware has been written in the Nim language to evade detection. The campaign has been attributed to the TA800… Read More

3 years ago

New Zoom Screen-Sharing Bug Lets Other Users Access Restricted Apps

A newly discovered glitch in Zoom's screen sharing feature can accidentally leak sensitive information to other attendees in a call,… Read More

3 years ago

New Hack Lets Attackers Bypass MasterCard PIN by Using Them As Visa Card

Cybersecurity researchers have disclosed a novel attack that could allow criminals to trick a point of sale terminal into transacting with a… Read More

3 years ago

Insecure Communication From WinZip 24 Lets Hackers Drop Malware

In the course of browsing for WinZip community communications improvements, the gurus noticed that by the unsecured tcp, the WinZip… Read More

3 years ago

Facebook Messenger bug lets Android users to spy on each other

Facebook Messenger application for Android experienced a crucial flaw that authorized callers to listen to other people&#8217 environment with no… Read More

3 years ago