CVE-2021-22333
There is an Improper Validation of Array Index vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute, thus obtaining system permissions.
SAN FRANCISCO, Aug 26 (Reuters) – Microsoft (MSFT.O) on Thursday warned thousands of its cloud computing customers, including some of the world’s largest companies, that intruders could have the ability to read, change or even delete their main databases, according to a copy of the email and a cyber security researcher. The vulnerability is in…
McDonald’s, the world’s largest burger chain, said on Friday that a data breach in South Korea and Taiwan has exposed some customer and employee information, making it the latest global company to be targeted by cybercriminals. The attackers accessed e-mails, phone numbers, and delivery addresses, but the breach did not include customer payment information, the…
Cross-Chain Protocol pNetwork Offers Hacker ‘Clean’ $1.5 Million Bug Bounty Dan Gunderman (dangun127) • September 20, 2021 (Source: Executium via Unsplash) Stay tuned for updates on this developing story. See Also: Accelerate Incident Response Times with Automated Investigation In the latest security incident involving a decentralized finance protocol, cross-chain project pNetwork…
An unknown malicious actor has compromised the official PHP Git repository in attempt to add backdoors to the code base of the PHP project. According to PHP programming language developer and maintainer Nikita Popov, the incident took place last Saturday, on March 28. He said that two malicious commits were pushed to the…
PrintNightmare is a 0-day vulbnerability in the widely used Windows Print Spooler service. And working exploits are out there. In a rush to be the first to publish a proof-of-concept (PoC), researchers have published a write-up and a demo exploit to demonstrate a vulnerability that has been dubbed PrintNightmare. Only to find out they had…
The enhanced version of the Raccoon stealer-as-a-service platform, found to be bundled with updated malware, is hidden in pirated software where it collects cryptocurrency coins and installs a software dropper to spread more malware, according to Threat Post. The threat actors who used the Raccoon Stealer platform to commit various cybercrimes have expanded their services…