Security
Headlines
HeadlinesLatestCVEs

Tag

#mac

Taskhub CRM Tool 2.8.6 SQL Injection

Taskhub CRM Tool version 2.8.6 suffers from a remote SQL injection vulnerability.

Packet Storm
#sql#csrf#vulnerability#web#mac#linux#intel#auth#firefox
Alert Prioritization and Guided Remediation: The future of EDR

Categories: Business Defeat alert fatigue using specialized threat intelligence. (Read more...) The post Alert Prioritization and Guided Remediation: The future of EDR appeared first on Malwarebytes Labs.

New Supply Chain Attack Hit Close to 100 Victims—and Clues Point to China

The hackers, who mostly targeted victims in Hong Kong, also hijacked Microsoft’s trust model to make their malware harder to detect.

New Variant of XLoader macOS Malware Disguised as 'OfficeNote' Productivity App

A new variant of an Apple macOS malware called XLoader has surfaced in the wild, masquerading its malicious features under the guise of an office productivity app called "OfficeNote." "The new version of XLoader is bundled inside a standard Apple disk image with the name OfficeNote.dmg," SentinelOne security researchers Dinesh Devadoss and Phil Stokes said in a Monday analysis. "The application

FBI and NCSC Warn of Foreign Cyberattacks on US Space Sector

By Habiba Rashid Foreign cyber spies are targeting the US space industry for secrets and technology, warns the FBI, NCSC, and AFOSI. This is a post from HackRead.com Read the original post: FBI and NCSC Warn of Foreign Cyberattacks on US Space Sector

CVE-2023-4373: Devolutions

Inadequate validation of permissions when employing remote tools and macros within Devolutions Remote Desktop Manager versions 2023.2.19 and earlier permits a user to initiate a connection without proper execution rights via the remote tools feature.

CVE-2023-4417: Devolutions

Improper access controls in the entry duplication component in Devolutions Remote Desktop Manager 2023.2.19 and earlier versions on Windows allows an authenticated user, under specific circumstances, to inadvertently share their personal vault entry with shared vaults via an incorrect vault in the duplication write process.

Jorani Remote Code Execution

This Metasploit module exploits an unauthenticated remote code execution vulnerability in Jorani versions prior to 1.0.2. It abuses log poisoning and redirection bypass via header spoofing and then it uses path traversal to trigger the vulnerability. It has been tested on Jorani 1.0.0.

Debian Security Advisory 5480-1

Debian Linux Security Advisory 5480-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.

New Malware Turns Windows and macOS Devices into Proxy Nodes

By Habiba Rashid Malware-Driven Proxy Servers Exploit Unsuspecting Users. This is a post from HackRead.com Read the original post: New Malware Turns Windows and macOS Devices into Proxy Nodes