Security
Headlines
HeadlinesLatestCVEs

Tag

#mac

Apple's Macs Have Long Escaped Ransomware. That May Be Changing

The discovery of malicious encryptors for Apple computers could herald new risks for macOS users if the malware continues to evolve.

Wired
#mac#windows#apple#linux
Red Hat Security Advisory 2023-1677-01

Red Hat Security Advisory 2023-1677-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include heap overflow and integer overflow vulnerabilities.

Living Off the Land (LOTL) attacks: Detecting ransomware gangs hiding in plain sight

Categories: Business Good tools gone bad. (Read more...) The post Living Off the Land (LOTL) attacks: Detecting ransomware gangs hiding in plain sight appeared first on Malwarebytes Labs.

Are Smart Home Devices Invading Your Privacy?

By Owais Sultan Smart home devices are becoming more and more popular in recent years, promising convenience and automation to enhance… This is a post from HackRead.com Read the original post: Are Smart Home Devices Invading Your Privacy?

Google Uncovers APT41's Use of Open Source GC2 Tool to Target Media and Job Sites

A Chinese nation-state group targeted an unnamed Taiwanese media organization to deliver an open source red teaming tool known as Google Command and Control (GC2) amid broader abuse of Google's infrastructure for malicious ends. The tech giant's Threat Analysis Group (TAG) attributed the campaign to a threat actor it tracks under the geological and geographical-themed moniker HOODOO, which is

Update Chrome now! Google patches actively exploited flaw

Categories: Exploits and vulnerabilities Categories: News Tags: Google Tags: Chrome zero-day Tags: CVE-2023-2033 Tags: V8 flaw Tags: V8 Google has released an updated version of Chrome to address a zero-day flaw that is being exploited in the wild. (Read more...) The post Update Chrome now! Google patches actively exploited flaw appeared first on Malwarebytes Labs.

10 Best Zippyshare Alternatives – Best File Sharing Services

By Waqas Zippyshare is no longer available after the service announced its shutdown on March 30th, 2023. This is a post from HackRead.com Read the original post: 10 Best Zippyshare Alternatives – Best File Sharing Services

A week in security (April 10 - 16)

Categories: News Tags: Lock and Code S04E09 Tags: Bennett Cyphers Tags: Apple vulnerability Tags: phone charging station Tags: FBI Tags: Yum! Brands Tags: KFC Tags: Pizza Hut Tags: Patch Tuesday Tags: sextortion Tags: malvertising Tags: Weebly Tags: AI Tags: virtual kidnapping Tags: ransomware review Tags: ransomware in the UK Tags: ransomware in France The most interesting security related news from the week of April 10 - 16. (Read more...) The post A week in security (April 10 - 16) appeared first on Malwarebytes Labs.

CVE-2023-29508: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in org.xwiki.platform:xwiki-platform-livedata-macro

XWiki Commons are technical libraries common to several other top level XWiki projects. A user without script rights can introduce a stored XSS by using the Live Data macro, if the last author of the content of the page has script rights. This has been patched in XWiki 14.10, 14.4.7, and 13.10.11.

CVE-2023-30537: XWIKI-20280: Improved link display for FlamingoThemesCode.WebHomeSheet · xwiki/xwiki-platform@df596f1

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with the right to add an object on a page can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the styles properties `FlamingoThemesCode.WebHome`. This page is installed by default. The vulnerability has been patched in XWiki versions 13.10.11, 14.4.7 and 14.10.