CVE-2021-22333
There is an Improper Validation of Array Index vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute, thus obtaining system permissions.
Executive Summary Informations Name CVE-2021-34645 First vendor Publication 2021-08-19 Vendor Cve Last vendor Modification 2021-08-19 Security-Database Scoring CVSS v3 Cvss vector : N/A Overall CVSS Score NA Base Score NA Environmental Score NA impact SubScore NA Temporal Score NA Exploitabality Sub Score NA Calculate full CVSS 3.0 Vectors scores Security-Database Scoring CVSS v2 Cvss…
A planned Biden administration executive order will require many software vendors to notify their federal government customers when the companies have a cybersecurity breach, according to a draft seen by Reuters. A National Security Council spokeswoman said no decision has been made on the final content of the executive order. The order could be released…
Famed anti-virus pioneer John McAfee has been indicted on charges of cryptocurrency fraud, money laundering and more. The 75-year-old, who is in Spain awaiting extradition to the US for tax evasion, is accused of conspiring with executive advisor Jimmy Watson and others on two fraud schemes running from December 2017-October 2018. The first was a…
In their Carbis Bay communique, the G7 announced their intention to work together to tackle ransomware groups. Days later, US president Joe Biden met with Russian president Vladimir Putin, where an extradition process to bring Russian cybercriminals to justice in the US was discussed. Putin reportedly agreed in principle, but insisted that extradition be reciprocal….
A new Android Trojan codenamed FlyTrap has hit at least 140 countries since March 2021 and has spread to over 10,000 victims through social media hijacking, third-party app stores, and sideloaded applications. Zimperium’s zLabs mobile threat research teams recently found several previously undetected applications using Zimperium’s z9 malware engine and on-device detection. Following their forensic…
One of the more popular solutions used when deploying, scaling, and managing containerized apps in the Cloud, the Kubernetes containers are often threat actors’ targets. This is the main reason that made the NSA and CISA publish a set of recommendations to help organizations strengthen their security. Source The 52-page cybersecurity technical report released by…