Security
Headlines
HeadlinesLatestCVEs

Tag

#chrome

New macOS malware steals sensitive info, including a user's entire Keychain database

Categories: Apple Categories: News Tags: MacStealer Tags: mac infostealer Tags: information stealer Tags: Apple Tags: Thomas Reed Tags: iCloud Keychain MacStealer could be an infamous stealer in the making, but right now, it needs improvement, according to Malwarebytes expert. (Read more...) The post New macOS malware steals sensitive info, including a user's entire Keychain database appeared first on Malwarebytes Labs.

Malwarebytes
#web#mac#apple#intel#pdf#chrome#firefox
Big changes to Twitter verification: How to spot a verified account

Categories: News Tags: twitter Tags: blue Tags: verified Tags: verification Tags: fake Tags: fraud Tags: phish Tags: phishing Tags: scam Tags: imposter Significant changes to Twitter's verification identifiers mean new rules for ensuring whether an account is real. (Read more...) The post Big changes to Twitter verification: How to spot a verified account appeared first on Malwarebytes Labs.

CVE-2023-1800: ForCVE/2023-0x05.md at main · yangyanglo/ForCVE

A vulnerability, which was classified as critical, has been found in sjqzhang go-fastdfs up to 1.4.3. Affected by this issue is the function upload of the file /group1/uploa of the component File Upload Handler. The manipulation leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224768.

Threat Roundup for March 24 to March 31

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 24 and March 31. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key

Textpattern 4.8.8 Remote Code Execution

Textpattern version 4.8.8 suffers from an authenticated remote code execution vulnerability.

CVE-2023-1741: report/README.md at main · private-null/report

A vulnerability was found in jeecg-boot 3.5.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file SysDictMapper.java of the component Sleep Command Handler. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224629 was assigned to this vulnerability.

Virtual Reception 1.0 Directory Traversal

Virtual Reception version 1.0 suffers from a directory traversal vulnerability.