Tag
#amazon
Ubuntu Security Notice 6079-1 - It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service.
Ubuntu Security Notice 6081-1 - Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did not properly implement speculative execution barriers in usercopy functions in certain situations. A local attacker could use this to expose sensitive information. Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel did not properly initialize some data structures. A local attacker could use this to expose sensitive information.
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
The families of victims of a mass shooting in Buffalo are challenging the platforms they believe led the attacker to carry out a racist massacre.
It's easy to think high-tech companies have a security advantage over other older, more mature industries. Most are unburdened by 40 years of legacy systems and software. They draw some of the world’s youngest, brightest digital natives to their ranks, all of whom consider cybersecurity issues their entire lives. Perhaps it is due to their familiarity with technology that causes them to overlook
The two-factor authentication tool got some serious upgrades that can help you bolster security for your online accounts.
Cross Site Scripting vulnerability found in Webkil QloApps v.1.5.2 allows a remote attacker to obtain sensitive information via the back and email_create parameters in the AuthController.php file.
Categories: Business How MSPs can prepare for the complex landscape of mobile malware. (Read more...) The post Navigating mobile malware trends: Crucial insights and predictions for MSPs appeared first on Malwarebytes Labs.
We talk to the Signal Foundation’s Meredith Whittaker about how the surveillance economy is newer than we all might realize—and what we can do to fight back.
Categories: Threat Intelligence We discovered a new interesting lure that targeted the Eastern Ukraine region and started tracking the threat actor behind it. (Read more...) The post Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 appeared first on Malwarebytes Labs.