Security
Headlines
HeadlinesLatestCVEs

Tag

#google

The forgotten malvertising campaign

Categories: Threat Intelligence Tags: malvertising Tags: ads Tags: notepad Tags: hta Tags: malware Tags: google A sophisticated threat actor has been using Google ads to deliver custom malware payloads to victims for months while flying under the radar. (Read more...) The post The forgotten malvertising campaign appeared first on Malwarebytes Labs.

Malwarebytes
#web#mac#windows#google#git#java#intel#pdf
CVE-2023-40791: LKML: Yikebaer Aizezi: WARNING in try_grab_page

extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.2 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page.

CVE-2023-40790: LKML: Sean Christopherson: Re: WARNING in kvm_arch_vcpu_ioctl_run

** DISPUTED ** An issue was discovered in the Linux kernel through 6.5.7. kvm_arch_vcpu_ioctl_run in arch/x86/kvm/x86.c allows a WARN_ON_ONCE if userspace stuffs a nonsensical vCPU state.

YouTube Takes on Ad Blockers with Warning Pop-Ups

By Waqas Using YouTube? You might need to disable your ad blocker or whitelist YouTube.com. This is a post from HackRead.com Read the original post: YouTube Takes on Ad Blockers with Warning Pop-Ups

Is It Possible to Delete Yourself From the Internet Altogether?

By Owais Sultan Believe it or not, the internet is now over half a century old. Of course, it has really… This is a post from HackRead.com Read the original post: Is It Possible to Delete Yourself From the Internet Altogether?

CVE-2023-30994: Security Bulletin: IBM QRadar SIEM includes components with known vulnerabilities

IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138

The US Congress Was Targeted With Predator Spyware

Plus: Hamas raised millions in crypto, Exxon used hacked data, and more.

NLB mKlik Makedonija 3.3.12 SQL Injection

The mobile application or the affected API suffers from an SQL Injection vulnerability. Input passed to the parameters that are associated to international transfer is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and disclose sensitive information.

Security Pros Warn That EU's Vulnerability Disclosure Rule Is Risky

The Cyber Resilience Act's requirement to disclose vulnerabilities within 24 hours could expose organizations to attacks — or government surveillance.

Gaza Conflict Paves Way for Pro-Hamas Information Operations

Mandiant's John Hultquist says to expect anti-Israel influence and espionage campaigns to ramp up as the war grinds on.