Security
Headlines
HeadlinesLatestCVEs

Tag

#mac

How to Stop Attackers That Target Healthcare Imaging Data

Attribute-based encryption could help keep sensitive metadata off of the Dark Web.

DARKReading
#vulnerability#web#mac#git#intel#oauth#auth
Apple Bug Could Allow Attackers Access to Photos and Messages

By Deeba Ahmed The bugs allowed cybercriminals to bypass the iOS system's security protections and execute unauthorized code. This is a post from HackRead.com Read the original post: Apple Bug Could Allow Attackers Access to Photos and Messages

Analysts Slam Twitter's Decision to Disable SMS-Based 2FA

Making the option available only to paid subscribers — while also claiming SMS authentication is broken — doesn't make sense, some say. Is it a cash grab?

Login Details of Tech Giants Leaked in Two Data Center Hacks

By Waqas Threat actors have hacked two data centers in Asia and accessed login credentials of top technology giants, including Apple, Uber, Microsoft, Samsung, Alibaba, etc., and leaked them on a hacker forum. This is a post from HackRead.com Read the original post: Login Details of Tech Giants Leaked in Two Data Center Hacks

Red Hat Security Advisory 2023-0838-01

Red Hat Security Advisory 2023-0838-01 - Samba is an open-source implementation of the Server Message Block protocol and the related Common Internet File System protocol, which allow PC-compatible machines to share files, printers, and various information.

Red Hat Security Advisory 2023-0859-01

Red Hat Security Advisory 2023-0859-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include code execution and integer overflow vulnerabilities.

Red Hat Security Advisory 2023-0832-01

Red Hat Security Advisory 2023-0832-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, null pointer, and use-after-free vulnerabilities.

CVE-2023-23009: abnormal TS payload causes pluto daemon to restart in libreswan 4.9 · Issue #954 · libreswan/libreswan

Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.

CVE-2022-45677: temp/README.md at main · yukar1z0e/temp

SQL Injection Vulnerability in tanujpatra228 Tution Management System (TMS) via the email parameter to processes/student_login.process.php.