Tag
By Deeba Ahmed Through the bug bounty program, ethical hackers will get rewards ranging from $100 - $31,337, depending on their discovered bug’s severity. This is a post from HackRead.com Read the original post: Google Introduces Bug Bounty Program for Open-Source Software
For VM_PFNMAP VMAs, there is a race between unmap_mapping_range() and munmap() that can lead to a page being freed by a device driver while the page still has stale TLB entries.
Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. It was discovered that the implementation of POSIX timers in the Linux kernel did not properly clean up timers in some situations. Various other vulnerabilities were also discovered.
The first-of-its-kind campaign threatens to remove code packages if developers don’t submit their code to a "validation" process.
The search engine giant's Vulnerability Rewards Program now covers any Google open source software projects — with a focus on critical software such as Go and Angular.
Categories: Exploits and vulnerabilities Categories: News Tags: Chrome Tags: Chromium Tags: clipboard Tags: Jeff Johnson Tags: clipboard manager Tags: Google doodles Chromium browsers can write to the system clipboard without user consent or knowledge (Read more...) The post Chromium browsers can write to the system clipboard without your permission appeared first on Malwarebytes Labs.
By Vanja Svajcer Cisco Talos recently observed three separate, but related, campaigns between March and June 2022 delivering a variety of threats, including the ModernLoader bot, RedLine information-stealer and cryptocurrency-mining malware to victims. The actors use PowerShell, .NET assemblies, and HTA and VBS files to spread across a targeted network, eventually dropping other pieces of malware, such as the SystemBC trojan and DCRAT, to enable various stages of their operations. The attackers' use of a variety of off-the-shelf tools makes it difficult to attribute this activity to a specific adversary. The final payload appears to be ModernLoader, which acts as a remote access trojan (RAT) by collecting system information and deploying various modules. In the earlier campaigns from March, we also observed the attackers delivering the cryptocurrency mining malware XMRig. The March campaigns appeared to be targeting Eastern European users, as the constructor utility we analyzed had...
In the last two weeks of the war, an ad hoc team armed with group chats, QR codes, and satellite maps launched a mad dash to save imperiled Afghan allies.
By Deeba Ahmed HelloTalk, GoogleClassroom, ClassDojo, and Duolingo turned out to be the top 3 educational apps that collect the most user data from Android devices. This is a post from HackRead.com Read the original post: What Are the Top 10 Android Educational Apps That Collect Most User Data?
The Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) WordPress plugin before 3.12.5 does not properly sanitize some parameters before inserting them into SQL queries. As a result, high privilege users could perform SQL injection attacks.