CVE-2021-1078
NVIDIA Windows GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel driver (nvlddmkm.sys) where a NULL pointer dereference may lead to system crash.
The world’s largest meat supplier, JBS, says that it has suffered a cyber attack against its IT systems in North America and Australia impacting its ability to “process” thousands of cattle, sheep, and pigs. The security incident, first spotted on Sunday, has not been officially confirmed to a be a ransomware attack – but I…
COPENHAGEN – Denmark’s central bank was compromised in last year’s global SolarWinds hacking operation, leaving a “backdoor” to its network open for seven months, IT media Version2 reported on Tuesday, citing documents related to the case. The hackers, accused by the United States of working for Russian intelligence, were unusually sophisticated and modified code in…
The TrickBot trojan is adding man-in-the-browser (MitB) capabilities for stealing online banking credentials that resemble Zeus, the early banking trojan, researchers said — potentially signaling a coming onslaught of fraud attacks. TrickBot is a sophisticated ( and common ) modular threat known for….
Safe Security, a Silicon Valley cyber risk management startup, has secured a $33 million investment from U.K. telco BT. Founded in 2012, Safe Security — formerly known as Lucideus — helps organizations measure and mitigate enterprise-wide cyber risk using its security assessment framework for enterprises (SAFE) platform. The service, which is used by a number…
A major cache of personal data for more than 500 million Facebook users has been published on hacking forums, in one of the biggest lapses of data protection for the social network so far. The database, published to a hacking forum, contains the personal data of hundreds of millions of Facebook users around the…
Background Microsoft has reported multiple exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor used these vulnerabilities to access on-premises Exchange servers which enabled access to email accounts, and allowed installation of additional malware to facilitate long-term access to victim environments….