Security
Headlines
HeadlinesLatestCVEs

Tag

#google

New Variant of XLoader macOS Malware Disguised as 'OfficeNote' Productivity App

A new variant of an Apple macOS malware called XLoader has surfaced in the wild, masquerading its malicious features under the guise of an office productivity app called "OfficeNote." "The new version of XLoader is bundled inside a standard Apple disk image with the name OfficeNote.dmg," SentinelOne security researchers Dinesh Devadoss and Phil Stokes said in a Monday analysis. "The application

The Hacker News
#web#mac#windows#apple#google#java#chrome#firefox#The Hacker News
Chrome will soon start removing extensions that may be unsafe

Categories: Personal Tags: chrome Tags: browser Tags: rogue Tags: malicious Tags: malware Tags: extension Tags: remove Tags: delete Tags: uninstall We take a look at news that Chrome will soon start asking users if they want to remove outdated extensions. (Read more...) The post Chrome will soon start removing extensions that may be unsafe appeared first on Malwarebytes Labs.

Fara Melk Estate CMS 1.5.0 Information Disclosure

Fara Melk Estate CMS version 1.5.0 suffers from an information leakage vulnerability.

Evsanati Radyo 1.0 Shell Upload

Evsanati Radyo version 1.0 suffers from a remote shell upload vulnerability.

Event Locations CMS 1.0.1 Shell Upload

Event Locations CMS version 1.0.1 suffers from a remote shell upload vulnerability.

DoorGets CMS 7.0 Information Disclosure

DoorGets CMS version 7.0 suffers from an information leakage vulnerability.

Emaar Real Estate Agency Directory System 5.7 Shell Upload

Emaar Real Estate Agency Directory System version 5.7 suffers from a remote shell upload vulnerability.

CVE-2023-40735: Advisories

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BUTTERFLY BUTTON PROJECT - BUTTERFLY BUTTON (Architecture) allows loss of plausible deniability, confidentiality.This issue affects BUTTERFLY BUTTON: As of 2023-08-21.

The Most Popular Digital Abortion Clinics, Ranked by Data Privacy

Telehealth companies that provide abortion pills are surging in popularity. Which are as safe as they claim to be?

How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes

From a user’s perspective, OAuth works like magic. In just a few keystrokes, you can whisk through the account creation process and gain immediate access to whatever new app or integration you’re seeking. Unfortunately, few users understand the implications of the permissions they allow when they create a new OAuth grant, making it easy for malicious actors to manipulate employees into giving