Security
Headlines
HeadlinesLatestCVEs

Tag

#mac

CVE-2022-3526

A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.

CVE
#vulnerability#mac#linux
How to make decentralized apps: Modern subtleties of development process management

By Owais Sultan Technology is moving towards modernized solutions and is constantly changing. Back in the day, there were web applications.… This is a post from HackRead.com Read the original post: How to make decentralized apps: Modern subtleties of development process management

FBI, CISA warn of disinformation ahead of midterms

Categories: News Tags: 2022 US midterm election Tags: US election Tags: FBI Tags: CISA Tags: With the US midterm elections in sight, federal agencies are warning Americans that foreign actors are likely to use information manipulation tactics (Read more...) The post FBI, CISA warn of disinformation ahead of midterms appeared first on Malwarebytes Labs.

Indian Energy Company Tata Power's IT Infrastructure Hit By Cyber Attack

Tata Power Company Limited, India's largest integrated power company, on Friday confirmed it was targeted by a cyberattack. The intrusion on IT infrastructure impacted "some of its IT systems," the company said in a filing with the National Stock Exchange (NSE) of India. It further said it has taken steps to retrieve and restore the affected machines, adding it put in place

CVE-2022-42961: Release wolfSSL Release 5.5.0 (Aug 30, 2022) · wolfSSL/wolfssl

An issue was discovered in wolfSSL before 5.5.0. A fault injection attack on RAM via Rowhammer leads to ECDSA key disclosure. Users performing signing operations with private ECC keys, such as in server-side TLS connections, might leak faulty ECC signatures. These signatures can be processed via an advanced technique for ECDSA key recovery. (In 5.5.0 and later, WOLFSSL_CHECK_SIG_FAULTS can be used to address the vulnerability.)

CVE-2017-20149: GitHub - BigNerd95/Chimay-Red: Working POC of Mikrotik exploit from Vault 7 CIA Leaks

The Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-term 6.37.5, aka Chimay-Red. A remote and unauthenticated user can trigger the vulnerability by sending a crafted HTTP request. An attacker can use this vulnerability to execute arbitrary code on the affected system, as exploited in the wild in mid-2017 and later.

Rising Bot Attacks – Why is Your Organization Struggling to Deal with Them?

By Waqas Bot attacks rose by 41% in H1 2021, with the financial services and media industries facing the highest proportion… This is a post from HackRead.com Read the original post: Rising Bot Attacks – Why is Your Organization Struggling to Deal with Them?

Linux, Windows and macOS Hit By New “Alchimist” Attack Framework

By Deeba Ahmed Alchimist is a single-file C2 framework discovered on a server hosting an active file listing on the root directory and a set of post-exploitation tools. This is a post from HackRead.com Read the original post: Linux, Windows and macOS Hit By New “Alchimist” Attack Framework

Microsoft Secures Azure Enclaves With Hardware Guards

Microsoft highlighted emerging confidential computing offerings for Azure during its Ignite conference.

CVE-2022-38440: Adobe Security Bulletin

Adobe Dimension versions 3.4.5 is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.