un BlueKeep Attacks Have Arrived, Are Initially Underwhelming By packetstormsecurity.com Published On :: Mon, 04 Nov 2019 16:38:28 GMT Full Article headline hacker microsoft flaw zero day
un OAuth Vulnerability Threatens Azure Accounts By packetstormsecurity.com Published On :: Wed, 04 Dec 2019 23:47:09 GMT Full Article headline microsoft flaw
un TOR Virtual Network Tunneling Tool 0.4.0.5 By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 10:11:11 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
un TOR Virtual Network Tunneling Tool 0.4.1.5 By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:34:13 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
un TOR Virtual Network Tunneling Tool 0.4.1.6 By packetstormsecurity.com Published On :: Thu, 19 Sep 2019 16:34:13 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
un TOR Virtual Network Tunneling Tool 0.4.2.5 By packetstormsecurity.com Published On :: Tue, 10 Dec 2019 16:02:28 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
un TOR Virtual Network Tunneling Tool 0.4.2.6 By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:46:25 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
un TOR Virtual Network Tunneling Tool 0.4.2.7 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:31:49 GMT Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Full Article
un Russian Charged With Running $20 Million Card Fraud Scheme By packetstormsecurity.com Published On :: Wed, 13 Nov 2019 17:01:47 GMT Full Article headline bank usa russia cybercrime fraud
un U.S. Military Tests Missile Previously Banned Under Treaty By packetstormsecurity.com Published On :: Fri, 13 Dec 2019 15:07:23 GMT Full Article headline government usa russia military
un Hotel Booking Sites Come Under Fire From Magecart By packetstormsecurity.com Published On :: Fri, 20 Sep 2019 14:43:51 GMT Full Article headline privacy bank cybercrime data loss fraud backdoor
un Federally Funded Unimax Smartphone Preloaded With Malware By packetstormsecurity.com Published On :: Mon, 13 Jan 2020 15:35:45 GMT Full Article headline government usa phone china cyberwar backdoor
un IBM Announces Computer Memory Breakthrough By packetstormsecurity.com Published On :: Fri, 01 Jul 2011 13:54:02 GMT Full Article headline ibm
un IBM Scientists Unveil Racetrack Memory Chip Prototype By packetstormsecurity.com Published On :: Tue, 06 Dec 2011 15:58:38 GMT Full Article headline ibm science
un FBI, ICE Plunder DMV Driver Database For Facial Recognition Scans By packetstormsecurity.com Published On :: Mon, 08 Jul 2019 14:35:03 GMT Full Article headline government privacy usa spyware fbi
un Nigerian Hacker Hunted In Vietnam By packetstormsecurity.com Published On :: Mon, 29 Oct 2007 10:48:32 GMT Full Article hacker britain vietnam
un macOS/iOS ImageIO PVR Processing Out-Of-Bounds Read By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 16:08:57 GMT macOS and iOS suffer from an ImageIO out-of-bounds read when processing PVR images. Full Article
un macOS/iOS IOAccelCommandQueue2::processSegmentKernelCommand() Out-Of-Bounds Timestamp Write By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 16:10:06 GMT macOS and iOS suffers from an out-of-bounds timestamp write in IOAccelCommandQueue2::processSegmentKernelCommand(). Full Article
un macOS / iOS launchd XPC Message Parsing Memory Corruption By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:53:01 GMT launchd on macOS and iOS suffer from a memory corruption issue due to a lack of bounds checking when parsing XPC messages. Full Article
un iOS / macOS AWDL Heap Corruption / Bounds Checking By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 10:11:11 GMT A remote iOS / macOS heap corruption issue exists due to insufficient bounds checking in AWDL. Full Article
un Secunia Security Advisory 29803 By packetstormsecurity.com Published On :: Tue, 15 Apr 2008 17:23:16 GMT Secunia Security Advisory - A vulnerability has been reported in MirBSD Korn Shell, which can be exploited by malicious, local users to gain escalated privileges. Full Article
un Mozilla Just Doubled Its Payouts As It Tries To Attract Software Vulnerability Hunters By packetstormsecurity.com Published On :: Wed, 20 Nov 2019 15:01:32 GMT Full Article headline hacker flaw mozilla firefox
un Researchers Uncover NSA Tool Enabling Faster Cracking Of RSA By packetstormsecurity.com Published On :: Wed, 02 Apr 2014 02:26:38 GMT Full Article headline government usa backdoor nsa cryptography rsa
un McAfee Uncovers 200 New Cyber Attacks Per Minute In 2013 By packetstormsecurity.com Published On :: Mon, 10 Mar 2014 15:12:39 GMT Full Article headline hacker malware cybercrime mcafee
un John McAfee Launches Website To Whine On By packetstormsecurity.com Published On :: Mon, 11 Aug 2014 15:37:27 GMT Full Article headline mcafee conference
un John McAfee Announces He's Running For President By packetstormsecurity.com Published On :: Wed, 09 Sep 2015 05:35:06 GMT Full Article headline government usa mcafee
un Intel Touts Bug Bounties To Hardware Hackers By packetstormsecurity.com Published On :: Fri, 17 Mar 2017 00:38:32 GMT Full Article headline hacker flaw mcafee
un John McAfee Says His Twitter Account Was Hacked By packetstormsecurity.com Published On :: Thu, 28 Dec 2017 15:49:52 GMT Full Article headline fraud mcafee twitter
un John McAfee's Unhackable Bitcoin Wallet Is Hackable, Company Admits By packetstormsecurity.com Published On :: Fri, 31 Aug 2018 13:42:57 GMT Full Article headline flaw mcafee cryptography
un John McAfee Found Liable For 2012 Death Of Belize Neighbor By packetstormsecurity.com Published On :: Fri, 16 Nov 2018 15:27:55 GMT Full Article headline mcafee
un Ubuntu Security Notice USN-4184-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:13 GMT Ubuntu Security Notice 4184-2 - USN-4184-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
un Ubuntu Security Notice USN-4183-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:18 GMT Ubuntu Security Notice 4183-2 - USN-4183-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
un Ubuntu Security Notice USN-4185-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:24 GMT Ubuntu Security Notice 4185-3 - USN-4185-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
un Ubuntu Security Notice USN-4186-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:56:10 GMT Ubuntu Security Notice 4186-3 - USN-4186-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
un Ubiquiti Networks UniFi Cloud Key Command Injection / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 27 Jul 2017 18:22:22 GMT Ubiquiti Networks UniFi Cloud Key with firmware versions 0.5.9 and 0.6.0 suffer from weak crypto, privilege escalation, and command injection vulnerabilities. Full Article
un Ubuntu Security Notice USN-3199-3 By packetstormsecurity.com Published On :: Mon, 28 Aug 2017 21:11:00 GMT Ubuntu Security Notice 3199-3 - USN-3199-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. A It was discovered that the ALGnew function in block_templace.c in the A Python Cryptography Toolkit contained a heap-based buffer overflow A vulnerability. A remote attacker could use this flaw to execute A arbitrary code by using a crafted initialization vector parameter. Various other issues were also addressed. Full Article
un Ubuntu Security Notice USN-3616-1 By packetstormsecurity.com Published On :: Tue, 03 Apr 2018 18:19:00 GMT Ubuntu Security Notice 3616-1 - It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Full Article
un Ubuntu Security Notice USN-3616-2 By packetstormsecurity.com Published On :: Mon, 09 Apr 2018 16:41:45 GMT Ubuntu Security Notice 3616-2 - USN-3616-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Various other issues were also addressed. Full Article
un Ubuntu Security Notice USN-3727-1 By packetstormsecurity.com Published On :: Wed, 01 Aug 2018 18:32:00 GMT Ubuntu Security Notice 3727-1 - It was discovered that Bouncy Castle incorrectly handled certain crypto algorithms. A remote attacker could possibly use these issues to obtain sensitive information, including private keys. Full Article
un Ubuntu Security Notice USN-3901-1 By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 18:08:40 GMT Ubuntu Security Notice 3901-1 - Jann Horn discovered that the userfaultd implementation in the Linux kernel did not properly restrict access to certain ioctls. A local attacker could use this possibly to modify files. It was discovered that the crypto subsystem of the Linux kernel leaked uninitialized memory to user space in some situations. A local attacker could use this to expose sensitive information. Various other issues were also addressed. Full Article
un Linux/x86 Egghunter / Null-Free Shellcode By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 10:11:11 GMT 33 bytes small Linux/x86 egghunter null-free shellcode. Full Article
un Linux/x64_86 Egghunter Execve Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 14:02:22 GMT 63 bytes small Linux/x64_86 dynamic egghunter shellcode that searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs. The payload is an execve(/bin/bash) shellcode. Full Article
un Linux/x86 Egghunter Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 19:22:22 GMT 39 bytes small Linux/x86 egghunter null-free shellcode. The egghunter dynamically searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs. Full Article
un Malicious Snoopware Targeting India Found At Tiny Midwest ISP By packetstormsecurity.com Published On :: Thu, 08 Aug 2013 03:40:51 GMT Full Article headline malware india cyberwar pakistan
un Data Of Nearly 700,000 Amex India Customers Exposed Via Unsecured MongoDB Server By packetstormsecurity.com Published On :: Wed, 07 Nov 2018 16:32:01 GMT Full Article headline privacy bank india cybercrime data loss fraud
un Google's Bug Bounty Program Just Had A Record-Breaking Year Of Payouts By packetstormsecurity.com Published On :: Wed, 29 Jan 2020 15:36:03 GMT Full Article headline hacker flaw google
un Cookiethief Android Malware Hijacks Facebook Accounts By packetstormsecurity.com Published On :: Thu, 12 Mar 2020 13:12:43 GMT Full Article headline malware phone google facebook
un Google Launches Coronavirus Website In The United States By packetstormsecurity.com Published On :: Sat, 21 Mar 2020 16:11:13 GMT Full Article headline virus google
un QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:15:08 GMT QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code. Full Article
un French Bean-Counters Sweet Talked Into Trojans By packetstormsecurity.com Published On :: Tue, 14 May 2013 14:55:54 GMT Full Article headline malware bank trojan symantec