Security
Headlines
HeadlinesLatestCVEs

Tag

#google

Deloitte Launches Expanded Cloud Security Management Platform

The CSM by Deloitte platform includes cloud security policy orchestration, cyber predictive analytics, attack surface management, and cyber cloud managed services.

DARKReading
#vulnerability#google#microsoft#git#intel
Recovering from romance scams with Cindy Liebes: Lock and Code S03E10

This week on Lock and Code, we speak with Cindy Liebes about the financial and emotional damage caused by romance scams and how to spot them. The post Recovering from romance scams with Cindy Liebes: Lock and Code S03E10 appeared first on Malwarebytes Labs.

How to remove Google from your life

Google and all its products can dominate the average person's life. Here's an in-depth guide on how to remove yourself from their ecosystem. The post How to remove Google from your life appeared first on Malwarebytes Labs.

CVE-2022-23332: CVE – Google Drive

Command injection vulnerability in Manual Ping Form (Web UI) in Shenzhen Ejoin Information Technology Co., Ltd. ACOM508/ACOM516/ACOM532 609-915-041-100-020 allows a remote attacker to inject arbitrary code via the field.

CVE-2022-1631: Users Account Pre-Takeover or Users Account Takeover. in microweber

Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim’s Email. This allows an attacker to gain pre-authentication to the victim’s account. Further, due to the lack of proper validation of email coming from Social Login and failing to check if an account already exists, the victim will not identify if an account is already existing. Hence, the attacker’s persistence will remain. An attacker would be able to see all the activities performed by the victim user impacting the confidentiality and attempt to modify/corrupt the data impacting the integrity and availability factor. This attack becomes more interesting when an attacker can register an account from an employee’s email address. Assuming the organization uses G-Suite, it is much more impactful to hijack into an employee’s account.

CVE-2022-23332: CVE – Google Drive

Command injection vulnerability in Manual Ping Form (Web UI) in Shenzhen Ejoin Information Technology Co., Ltd. ACOM508/ACOM516/ACOM532 609-915-041-100-020 allows a remote attacker to inject arbitrary code via the field.

A special browser designed for online banking. Good idea, or not so much?

A specialized banking browser was introduced by a major German bank. While that sounds like a good idea, it looks like they are overestimating what it can do. The post A special browser designed for online banking. Good idea, or not so much? appeared first on Malwarebytes Labs.

What to Do If You Can't Log In to Your Google Account

Locked outside your calendar or Gmail? Here's how to get un-stuck—and prevent it from happening in the first place.

A scanning tool for open-sourced software packages? Yes, please!

OpenSSF recently introduced a dynamic analysis tool for all OSS packages when uploaded to open source repositories. The post A scanning tool for open-sourced software packages? Yes, please! appeared first on Malwarebytes Labs.

Another Set of Joker Trojan-Laced Android Apps Resurfaces on Google Play Store

A new set of trojanized apps spread via the Google Play Store has been observed distributing the notorious Joker malware on compromised Android devices. Joker, a repeat offender, refers to a class of harmful apps that are used for billing and SMS fraud, while also performing a number of actions of a malicious hacker's choice, such as stealing text messages, contact lists, and device information.