Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

CVE-2023-2872: WindowsKernelVuln/unassigned45 at master · zeze-zeze/WindowsKernelVuln

A vulnerability classified as problematic has been found in FlexiHub 5.5.14691.0. This affects the function 0x220088 in the library fusbhub.sys of the component IoControlCode Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229851. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE
#vulnerability#windows#git
CVE-2023-1944: GitHub - kubernetes/minikube: Run Kubernetes locally

This vulnerability enables ssh access to minikube container using a default password.

CVE-2021-25749: [Security Advisory] CVE-2021-25749: runAsNonRoot logic bypass for Windows containers

Windows workloads can run as ContainerAdministrator even when those workloads set the runAsNonRoot option to true.

eScan Management Console 14.0.1400.2281 SQL Injection

eScan Management Console version 14.0.1400.2281 suffers from a remote SQL injection vulnerability.

eScan Management Console 14.0.1400.2281 Cross Site Scripting

eScan Management Console version 14.0.1400.2281 suffers from a cross site scripting vulnerability.

Quicklancer 1.0 SQL Injection

Quicklancer version 1.0 suffers from a remote SQL injection vulnerability.

Tracking down a trojan: An inside look at threat hunting in a corporate network

Categories: Business How Malwarebytes MDR successfully helped a company detect and respond to the potent banking Trojan QBot. (Read more...) The post Tracking down a trojan: An inside look at threat hunting in a corporate network appeared first on Malwarebytes Labs.

N. Korean Lazarus Group Targets Microsoft IIS Servers to Deploy Espionage Malware

The infamous Lazarus Group actor has been targeting vulnerable versions of Microsoft Internet Information Services (IIS) servers as an initial breach route to deploy malware on targeted systems. The findings come from the AhnLab Security Emergency response Center (ASEC), which detailed the advanced persistent threat's (APT) continued abuse of DLL side-loading techniques to deploy malware. "The

CISA updates ransomware guidance

Categories: News Categories: Ransomware Tags: CISA Tags: StopRansomware Tags: guide Tags: ZTA Tags: compromised Tags: cloud Tags: MDR CISA has updated its #StopRansomware guide to account for changes in ransomware tactics and techniques. (Read more...) The post CISA updates ransomware guidance appeared first on Malwarebytes Labs.