Blog


New Adobe Flash Zero-Day Exploit Found Hidden Inside MS Office Docs [thehackernews]

Cybersecurity researchers have discovered a new zero-day vulnerability in Adobe Flash Player that hackers are actively exploiting in the wild as part of a targeted campaign appears to be attacking a Russian state health care institution. The vulnerability, tracked as CVE-2018-15982, is a use-after-free flaw resides in Flash Player that, if exploited successfully, allows an attacker to execute arbitrary code on the targeted computer and eventually...

Read More


Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command [thehackernews]

A low-privileged user account on most Linux operating systems with UID value anything greater than 2147483647 can execute any systemctl command unauthorizedly—thanks to a newly discovered vulnerability. The reported vulnerability actually resides in PolicyKit (also known as polkit)—an application-level toolkit for Unix-like operating systems that defines policies, handles system-wide privileges and provides a way for non-privileged processes to communicate with privileged ones, such as “sudo,”...

Read More


VMware Releases Security Updates

Description: VMware has released security updates to address a vulnerability in Workstation and Fusion. Impact: A remote attacker could exploit this vulnerability to take control of an affected system. Mitigation: Updates are available. Please see the references or vendor advisory for more information. Reference URL’s: https://www.vmware.com/security/advisories/VMSA-2018-0030.html


Samba Releases Security Updates

Description: The Samba Team has released security updates to address several vulnerabilities in Samba. Impact: A remote attacker could exploit this vulnerability to take control of an affected system. Mitigation: Updates are available. Please see the references or vendor advisory for more information. Reference URL’s:  CVE-2018-14629 CVE-2018-16841 CVE-2018-16851 CVE-2018-16852 CVE-2018-16853 CVE-2018-16857


Apple Releases Multiple Security Updates

Description: Apple has released security updates to address vulnerabilities in multiple products. iCloud for Windows 7.9 Safari 12.0.2 iTunes 12.9.2 for Windows macOS Mojave 10.14.2, Security Update  2018-003 High Sierra, Security Update 2018-006 Sierra tvOS 12.1.1 iOS 12.1.1 Impact: A remote attacker could exploit this vulnerability to take control of an affected system. Mitigation: Updates are available. Please see the references or vendor advisory for...

Read More


Akamai Security Intelligence & Threat Research UPNPROXY: ETERNALSILENCE[akamai]

OVERVIEW: UPnProxy is alive and well. There are 277,000 devices, out of a pool of 3.5 million, running vulnerable implementations of UPnP. Of those, Akamai can confirm that more than 45,000 have been compromised in a widely distributed UPnP NAT injection campaign. These injections expose machines living behind the router to the Internet and appear to target the service ports used by SMB. BACKGROUND: Earlier...

Read More


মেরিডিয়ান কমিউনিটিতে বাংলাদেশের পদার্পন

মেরিডিয়ান কমিউনিটিতে বাংলাদেশের পদার্পন

মেরিডিয়ান কমিউনিটি কি? “মেরিডিয়ান প্রসেস কমিউনিটি ” বিশ্বব্যাপী অবস্থিত ক্রিটিক্যাল ইনফরমেশন ইনফ্রাস্ট্রাকচার সমূহের সুরক্ষার (Critical Information Infrastructure Protection, CIIP) লক্ষ্যে সরকারি সংস্থাগুলোর মাঝে অভ্যন্তরীণ যোগাযোগ বৃদ্ধি, তথ্য ও ধারণা বিনিময় এবং সমস্যা নিরুপনের বিভিন্ন উপযোগী পদক্ষেপসমূহ নিয়ে কাজ করে থাকে। এই কমিউনিটি বিশ্বের বিভিন্ন দেশের সরকার ও সরকারি সংস্থাগুলোর মাঝে আন্তঃযোগাযোগ বৃদ্ধি, তাদের অভ্যন্তরীণ যোগাযোগ ও সহযোগিতার সুযোগ সৃষ্টি এবং সমস্যা সমাধানের জন্য প্রচলিত কর্মকান্ডগুলো...

Read More


0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones [thehackernews]

At Pwn2Own 2018 mobile hacking competition held in Tokyo on November 13-14, white hat hackers once again demonstrated that even the fully patched smartphones running the latest version of software from popular smartphone manufacturers can be hacked. Three major flagship smartphones—iPhone X, Samsung Galaxy S9, and Xiaomi Mi6—were among the devices that successfully got hacked at the annual mobile hacking contest organized by Trend Micro’s...

Read More


Gmail Bugs Allow Changing From: Field and Spoofing Recipient’s Address[bleepingcomputer]

A bug in the way Gmail handles the structure of the ‘From:’ header could allow placing of an arbitrary email address in the sender field. Although this issue opens the door for high-level abuse, at the very least it is possible to add the recipient’s address and confuse them about the emails they sent and their content. Touching the sender field Software developer Tim Cotten recently investigated an...

Read More


TrickBot Banking Trojan Starts Stealing Windows Problem History [source: bleepingcomputer]

A version of TrickBot spotted recently shows interest in data that is peculiar for the normal scope of banking trojans: the Windows system reliability and performance information. Microsoft runs a Reliability Analysis Component (RAC) on Windows operating systems to supply the Reliability Monitor with details about software installations, upgrades, errors from the operating systems and applications, as well as hardware-related issues. For this purpose, it uses...

Read More


Page 76 of 159« First...102030...7475767778...90100110...Last »