Article: Six Facts about Address Space Layout Randomization on Windows - published over 4 years ago. Content: Overcoming address space layout randomization (ASLR) is a precondition of virtually all modern memory corruption vulnerabilities. Breaking ASLR is an area of active research and can get incredibly complicated. This blog post presents some basic facts about ASLR, focusing on the Windows implementation. In addition to covering what ASLR accomplishes ... http://www.fireeye.com/blog/threat-research/2020/03/six-facts-about-address-space-layout-randomization-on-windows.html Published: 2020 03 17 17:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Social Engineering Based on Stimulus Bill and COVID-19 Financial Compensation Schemes Expected to Grow in Coming Weeks - published over 4 years ago. Content: Given the community interest and media coverage surrounding the economic stimulus bill currently being considered by the United States House of Representatives, we anticipate attackers will increasingly leverage lures tailored to the new stimulus bill and related recovery efforts such as stimulus checks, unemployment compensation and small business... http://www.fireeye.com/blog/threat-research/2020/03/stimulus-bill-social-engineering-covid-19-financial-compensation-schemes.html Published: 2020 03 27 19:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: FakeNet Genie: Improving Dynamic Malware Analysis with Cheat Codes for FakeNet-NG - published over 4 years ago. Content: As developers of the network simulation tool FakeNet-NG, reverse engineers on the FireEye FLARE team, and malware analysis instructors, we get to see how different analysts use FakeNet-NG and the challenges they face. We have learned that FakeNet-NG provides many useful features and solutions of which our users are often unaware. In this blog post,... http://www.fireeye.com/blog/threat-research/2020/04/improving-dynamic-malware-analysis-with-cheat-codes-for-fakenet-ng.html Published: 2020 04 02 15:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Thinking Outside the Bochs: Code Grafting to Unpack Malware in Emulation - published over 4 years ago. Content: This blog post continues the FLARE script series with a discussion of patching IDA Pro database files (IDBs) to interactively emulate code. While the fastest way to analyze or unpack malware is often to run it, malware won’t always successfully execute in a VM. I use IDA Pro’s Bochs integration in IDB mode to sidestep tedious debugging scenarios ... http://www.fireeye.com/blog/threat-research/2020/04/code-grafting-to-unpack-malware-in-emulation.html Published: 2020 04 07 16:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Limited Shifts in the Cyber Threat Landscape Driven by COVID-19 - published over 4 years ago. Content: Though COVID-19 has had enormous effects on our society and economy, its effects on the cyber threat landscape remain limited. For the most part, the same actors we have always tracked are behaving in the same manner they did prior to the crisis. There are some new challenges, but they are perceptible, and we—and our customers—are prepared to conti... http://www.fireeye.com/blog/threat-research/2020/04/limited-shifts-in-cyber-threat-landscape-driven-by-covid-19.html Published: 2020 04 08 16:15:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: New Variant of Ploutus ATM Malware Observed in the Wild in Latin America - published almost 8 years ago. Content: Introduction Ploutus is one of the most advanced ATM malware families we’ve seen in the last few years. Discovered for the first time in Mexico back in 2013, Ploutus enabled criminals to empty ATMs using either an external keyboard attached to the machine or via SMS message, a technique that had never been seen before. FireEye Labs recently ide... http://www.fireeye.com/blog/threat-research/2017/01/new_ploutus_variant.html Published: 2017 01 12 01:45:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Separating the Signal from the Noise: How Mandiant Intelligence Rates Vulnerabilities — Intelligence for Vulnerability Management, Part Three - published over 4 years ago. Content: One of the critical strategic and tactical roles that cyber threat intelligence (CTI) plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk. In this four-part blog series, FireEye Mandiant Threat Intelligence highlights the v... http://www.fireeye.com/blog/threat-research/2020/04/how-mandiant-intelligence-rates-vulnerabilities.html Published: 2020 04 20 12:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Vietnamese Threat Actors APT32 Targeting Wuhan Government and Chinese Ministry of Emergency Management in Latest Example of COVID-19 Related Espionage - published over 4 years ago. Content: From at least January to April 2020, suspected Vietnamese actors APT32 carried out intrusion campaigns against Chinese targets that Mandiant Threat Intelligence believes was designed to collect intelligence on the COVID-19 crisis. Spear phishing messages were sent by the actor to China's Ministry of Emergency Management as well as the government of... http://www.fireeye.com/blog/threat-research/2020/04/apt32-targeting-chinese-government-in-covid-19-related-espionage.html Published: 2020 04 22 14:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Putting the Model to Work: Enabling Defenders With Vulnerability Intelligence — Intelligence for Vulnerability Management, Part Four - published over 4 years ago. Content: One of the critical strategic and tactical roles that cyber threat intelligence (CTI) plays is in the tracking, analysis, and prioritization of software vulnerabilities that could potentially put an organization’s data, employees and customers at risk. In this four-part blog series, FireEye Mandiant Threat Intelligence highlights the v... http://www.fireeye.com/blog/threat-research/2020/04/enabling-defenders-with-vulnerability-intelligence.html Published: 2020 04 27 12:30:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: FLARE IDA Pro Script Series: MSDN Annotations Plugin for Malware Analysis - published about 10 years ago. Content: The FireEye Labs Advanced Reverse Engineering (FLARE) Team continues to share knowledge and tools with the community. We started this blog series with a script for Automatic Recovery of Constructed Strings in Malware. As always, you can download these scripts at the following location: https://github.com/fireeye/flare-ida. We hope you find all th... http://www.fireeye.com/blog/threat-research/2014/09/flare-ida-pro-script-series-msdn-annotations-ida-pro-for-malware-analysis.html Published: 2014 09 11 22:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool - published over 4 years ago. Content: We recently encountered a large obfuscated malware sample that offered several interesting analysis challenges. It used virtualization that prevented us from producing a fully-deobfuscated memory dump for static analysis. Statically analyzing a large virtualized sample can take anywhere from several days to several weeks. Bypassing this time-consum... http://www.fireeye.com/blog/threat-research/2020/07/configuring-windows-domain-dynamically-analyze-obfuscated-lateral-movement-tool.html Published: 2020 07 07 18:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families - published over 4 years ago. Content: Mandiant Threat Intelligence has researched and written extensively on the increasing financially motivated threat activity directly impacting operational technology (OT) networks. Some of this research is available in our previous blog posts on industrial post-compromise ransomware and FireEye's approach to OT security. While most of the actor... http://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html Published: 2020 07 15 15:00:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: capa: Automatically Identify Malware Capabilities - published over 4 years ago. Content: capa is the FLARE team’s newest open-source tool for analyzing malicious programs. Our tool provides a framework for the community to encode, recognize, and share behaviors that we’ve seen in malware. Regardless of your background, when you use capa, you invoke decades of cumulative reverse engineering experience to figure out what a program does. ... http://www.fireeye.com/blog/threat-research/2020/07/capa-automatically-identify-malware-capabilities.html Published: 2020 07 16 19:40:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Unique Threats to Operational Technology and Cyber Physical Systems - published over 4 years ago. Content: In this latest episode of our Eye on Security podcast, I talk all about the world of operational technology (OT) and cyber physical systems with one of our foremost experts on the topic: Nathan Brubaker, Senior Manager of Analysis for Mandiant Threat Intelligence. Nathan kicked off our chat by explaining what exactly we mean when we use the ter... http://www.fireeye.com/blog/threat-research/2020/07/unique-threats-to-operational-technology-and-cyber-physical-systems.html Published: 2020 07 20 17:30:00 Received: 2021 11 02 20:00:26 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: iBackDoor: High-Risk Code Hits iOS Apps - published about 9 years ago. Content: Introduction FireEye mobile researchers recently discovered potentially “backdoored” versions of an ad library embedded in thousands of iOS apps originally published in the Apple App Store. The affected versions of this library embedded functionality in iOS apps that used the library to display ads, allowing for potential malicious access to se... http://www.fireeye.com/blog/threat-research/2015/11/ibackdoor_high-risk.html Published: 2015 11 04 18:00:00 Received: 2021 11 02 20:00:25 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Maimed Ramnit Still Lurking in the Shadow - published almost 9 years ago. Content: Newspapers have the ability to do more than simply keep us current with worldly affairs; we can use them to squash bugs! Yet, as we move from waiting on the newspaper delivery boy to reading breaking news on ePapers, we lose the subtle art of bug squashing. Instead, we end up exposing ourselves to dangerous digital bugs that can affect our virtual ... http://www.fireeye.com/blog/threat-research/2016/02/maimed_ramnit_still.html Published: 2016 02 18 17:00:00 Received: 2021 11 02 20:00:25 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Going To Ground with The Windows Scripting Host (WSH) - published almost 11 years ago. Content: About a month ago, I was involved in an investigation that revealed a targeted attacker using an interesting variation of a well-known persistence mechanism - a technique that is relevant both to incident responders hunting for evil and penetration testers looking to add post-exploitation methods to their toolkit. Today, I'm going to t... http://www.fireeye.com/blog/threat-research/2014/02/ground-windows-scripting-host-wsh.html Published: 2014 02 19 21:56:00 Received: 2021 11 02 20:00:24 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: New Zero-Day Exploit targeting Internet Explorer Versions 9 through 11 Identified in Targeted Attacks - published over 10 years ago. Content: Summary FireEye Research Labs, the intelligence behind our Mandiant Consultancy services, identified a new Internet Explorer (IE) zero-day exploit used in targeted attacks. The vulnerability affects IE6 through IE11, but the attack is targeting IE9 through IE11. This zero-day bypasses both ASLR and DEP. Microsoft has assigned CVE-2014-1776 to... http://www.fireeye.com/blog/threat-research/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html Published: 2014 04 27 02:29:08 Received: 2021 11 02 20:00:24 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: How a Squid Game Crypto Scam Got Away With Millions - published about 3 years ago. Content: https://www.wired.com/story/squid-game-coin-crypto-scam Published: 2021 11 02 18:47:56 Received: 2021 11 02 19:07:09 Feed: Wired.com – Security Feed Source: Wired Category: News Topic: Cyber Security |
Article: YouTube Video Grabber 1.9.9.1 Buffer Overflow - published about 3 years ago. Content: https://cxsecurity.com/issue/WLB-2021110008 Published: 2021 11 02 18:45:25 Received: 2021 11 02 19:06:44 Feed: WLB2 Database - CXSecurity.com Source: WLB2 Database - CXSecurity.com Category: Alerts Topic: Vulnerabilities |
|
Article: Codiad 2.8.4 Shell Upload - published about 3 years ago. Content: https://cxsecurity.com/issue/WLB-2021110009 Published: 2021 11 02 18:45:53 Received: 2021 11 02 19:06:44 Feed: WLB2 Database - CXSecurity.com Source: WLB2 Database - CXSecurity.com Category: Alerts Topic: Vulnerabilities |
|
Article: WordPress Pie Register 3.7.1.4 Authentication Bypass / Remote Code Execution - published about 3 years ago. Content: https://cxsecurity.com/issue/WLB-2021110010 Published: 2021 11 02 18:46:08 Received: 2021 11 02 19:06:44 Feed: WLB2 Database - CXSecurity.com Source: WLB2 Database - CXSecurity.com Category: Alerts Topic: Vulnerabilities |
Article: Dynojet Power Core 2.3.0 Unquoted Service Path - published about 3 years ago. Content: https://cxsecurity.com/issue/WLB-2021110011 Published: 2021 11 02 18:46:23 Received: 2021 11 02 19:06:44 Feed: WLB2 Database - CXSecurity.com Source: WLB2 Database - CXSecurity.com Category: Alerts Topic: Vulnerabilities |
|
Article: i3 International Annexxus Cameras Ax-n 5.2.0 Application Logic Flaw - published about 3 years ago. Content: https://cxsecurity.com/issue/WLB-2021110012 Published: 2021 11 02 18:46:41 Received: 2021 11 02 19:06:44 Feed: WLB2 Database - CXSecurity.com Source: WLB2 Database - CXSecurity.com Category: Alerts Topic: Vulnerabilities |
|
Article: Ericsson Network Location MPS GMPC21 Privilege Escalation - published about 3 years ago. Content: https://cxsecurity.com/issue/WLB-2021110013 Published: 2021 11 02 18:47:03 Received: 2021 11 02 19:06:44 Feed: WLB2 Database - CXSecurity.com Source: WLB2 Database - CXSecurity.com Category: Alerts Topic: Vulnerabilities |
Article: News247 News Magazine (CMS) - Admin Panel Authentication Bypass (NoRedirect) - published about 3 years ago. Content: https://cxsecurity.com/issue/WLB-2021110014 Published: 2021 11 02 18:48:52 Received: 2021 11 02 19:06:44 Feed: WLB2 Database - CXSecurity.com Source: WLB2 Database - CXSecurity.com Category: Alerts Topic: Vulnerabilities |
|
Article: My Movie Collection Sinatra App Login Cross Site Scripting - published about 3 years ago. Content: https://cxsecurity.com/issue/WLB-2021110015 Published: 2021 11 02 18:49:29 Received: 2021 11 02 19:06:44 Feed: WLB2 Database - CXSecurity.com Source: WLB2 Database - CXSecurity.com Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-41646 (online_reviewer_system) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41646 Published: 2021 10 29 18:15:08 Received: 2021 11 02 19:06:40 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-41313 (jira_software_data_center) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41313 Published: 2021 11 01 03:15:06 Received: 2021 11 02 19:06:39 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-38948 - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38948 Published: 2021 11 02 16:15:07 Received: 2021 11 02 19:06:39 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-36808 (sophos_secure_workspace) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36808 Published: 2021 10 30 13:15:07 Received: 2021 11 02 19:06:38 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-33259 (dir-868lw_firmware) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33259 Published: 2021 10 31 19:15:09 Received: 2021 11 02 19:06:38 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-31624 (ac9_firmware) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31624 Published: 2021 10 29 11:15:08 Received: 2021 11 02 19:06:38 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-29888 - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29888 Published: 2021 11 02 16:15:07 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-29875 - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29875 Published: 2021 11 02 16:15:07 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-29771 - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29771 Published: 2021 11 02 16:15:07 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-29738 - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29738 Published: 2021 11 02 16:15:07 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-29737 - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29737 Published: 2021 11 02 16:15:07 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24813 (events_made_easy) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24813 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24809 (bp_better_messages) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24809 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-24808 (bp_better_messages) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24808 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24799 (far_future_expiry_header) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24799 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24794 (connections_business_directory) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24794 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-24793 (wpematico_rss_feed_fetcher) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24793 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24789 (flat_preloader) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24789 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24781 (image_source_control) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24781 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-24773 (wordpress_download_manager) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24773 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24770 (stylish_price_list) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24770 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24757 (stylish_price_list) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24757 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-24742 (logo_slider_and_showcase) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24742 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24723 (wp_reactions_lite) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24723 Published: 2021 11 01 09:15:09 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24722 (restaurant_menu) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24722 Published: 2021 11 01 09:15:08 Received: 2021 11 02 19:06:37 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-24717 (automatorwp) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24717 Published: 2021 11 01 09:15:08 Received: 2021 11 02 19:06:36 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24716 (modern_events_calendar_lite) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24716 Published: 2021 11 01 09:15:08 Received: 2021 11 02 19:06:36 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-24715 (wp_sitemap_page) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24715 Published: 2021 11 01 09:15:08 Received: 2021 11 02 19:06:36 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-24685 (flat_preloader) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-24685 Published: 2021 11 01 09:15:08 Received: 2021 11 02 19:06:36 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-20839 (office_server_document_converter) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20839 Published: 2021 11 01 02:15:06 Received: 2021 11 02 19:06:35 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-20838 (office_server_document_converter) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20838 Published: 2021 11 01 02:15:06 Received: 2021 11 02 19:06:35 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2020-25912 (symphony) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25912 Published: 2021 10 31 19:15:09 Received: 2021 11 02 19:06:34 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2020-25911 (modx_revolution) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-25911 Published: 2021 10 31 19:15:09 Received: 2021 11 02 19:06:34 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: Phishing and Spam Lures Feature Sports, Aim to Steal Credentials - published about 3 years ago. Content: https://www.darkreading.com/threat-intelligence/phishing-and-spam-lures-feature-sports-aim-to-steal-credentials Published: 2021 11 02 17:27:46 Received: 2021 11 02 19:00:28 Feed: Dark Reading: Source: Dark Reading Category: News Topic: Cyber Security |
Article: Facebook Shuttering Facial Recognition System, Will Delete Data From Over a Billion Users - published about 3 years ago. Content: https://www.macrumors.com/2021/11/02/facebook-shutting-down-face-recognition/ Published: 2021 11 02 17:43:54 Received: 2021 11 02 18:06:37 Feed: MacRumors : Mac News and Rumors Source: MacRumors : Mac News and Rumors Category: News Topic: Cyber Security |
|
Article: Netflix Taking on Apple Arcade With Official Games Launch on Android - published about 3 years ago. Content: https://www.macrumors.com/2021/11/02/netflix-games-launch-android/ Published: 2021 11 02 17:58:55 Received: 2021 11 02 18:06:37 Feed: MacRumors : Mac News and Rumors Source: MacRumors : Mac News and Rumors Category: News Topic: Cyber Security |
|
Article: Escalating XSS to Sainthood with Nagios (XSS -> Root RCE in Nagios Server) - published about 3 years ago. Content: submitted by /u/pocorgtfoftw [link] [comments] https://www.reddit.com/r/netsec/comments/ql3jan/escalating_xss_to_sainthood_with_nagios_xss_root/ Published: 2021 11 02 12:54:08 Received: 2021 11 02 18:04:21 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
Article: A tool to build PCAP syntax for tcpdump, Fortinet and Checkpoint - published about 3 years ago. Content: submitted by /u/zsaile [link] [comments] https://www.reddit.com/r/netsec/comments/ql6p1f/a_tool_to_build_pcap_syntax_for_tcpdump_fortinet/ Published: 2021 11 02 15:27:16 Received: 2021 11 02 18:04:21 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
|
Article: Toxiproxy: A TCP proxy to simulate network and system conditions for chaos and resiliency testing - published about 3 years ago. Content: submitted by /u/Titokhan [link] [comments] https://www.reddit.com/r/netsec/comments/ql9zcj/toxiproxy_a_tcp_proxy_to_simulate_network_and/ Published: 2021 11 02 17:54:19 Received: 2021 11 02 18:04:21 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
|
Article: Fuzzing workshop contents(5 hours) - published about 3 years ago. Content: submitted by /u/secgeek [link] [comments] https://www.reddit.com/r/netsec/comments/ql76wi/fuzzing_workshop_contents5_hours/ Published: 2021 11 02 15:50:41 Received: 2021 11 02 18:04:21 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
Article: Step by step into Shellbot malware analysis, architecture, and malicious activity. - published about 3 years ago. Content: submitted by /u/MiguelHzBz [link] [comments] https://www.reddit.com/r/netsec/comments/ql6cxy/step_by_step_into_shellbot_malware_analysis/ Published: 2021 11 02 15:11:54 Received: 2021 11 02 18:04:21 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
|
Article: Android Patches Actively Exploited Zero-Day Kernel Bug - published about 3 years ago. Content: https://threatpost.com/android-patches-exploited-kernel-bug/175931/ Published: 2021 11 02 17:20:42 Received: 2021 11 02 18:00:39 Feed: Threatpost – Mobile Security Source: Threatpost Category: News Topic: Mobile Security |
|
Article: Over 30,000 GitLab servers still unpatched against critical bug - published about 3 years ago. Content: https://www.bleepingcomputer.com/news/security/over-30-000-gitlab-servers-still-unpatched-against-critical-bug/ Published: 2021 11 02 17:46:57 Received: 2021 11 02 18:00:19 Feed: Bleeping Computer - All News Feeds Source: Bleeping Computer Category: News Topic: Cyber Security |
|
Article: US land borders open to tourists on November 8 - published about 3 years ago. Content: https://www.securitymagazine.com/articles/96436-us-land-borders-open-to-tourists-on-november-8 Published: 2021 11 02 16:57:17 Received: 2021 11 02 18:00:04 Feed: Security Magazine – All Feeds Source: Security Magazine Category: News Topic: Security |
Article: CVE-2021-37915 (ht801_firmware) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37915 Published: 2021 10 28 12:15:08 Received: 2021 11 02 17:06:15 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-37254 (m-files_web) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37254 Published: 2021 10 28 14:15:08 Received: 2021 11 02 17:06:15 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-36794 - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36794 Published: 2021 11 02 14:15:13 Received: 2021 11 02 17:06:14 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-36551 (tikiwiki_cms/groupware) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36551 Published: 2021 10 28 20:15:07 Received: 2021 11 02 17:06:14 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-30823 (ipad_os, iphone_os, macos, safari, tvos, watchos) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30823 Published: 2021 10 28 19:15:09 Received: 2021 11 02 17:06:13 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-30821 (mac_os_x, macos) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30821 Published: 2021 10 28 19:15:09 Received: 2021 11 02 17:06:13 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-30818 (ipados, iphone_os, safari, tvos, watchos) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30818 Published: 2021 10 28 19:15:08 Received: 2021 11 02 17:06:13 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-30817 (macos) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30817 Published: 2021 10 28 19:15:08 Received: 2021 11 02 17:06:13 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-30816 (ipados, iphone_os) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30816 Published: 2021 10 28 19:15:08 Received: 2021 11 02 17:06:13 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-30814 (ipados, iphone_os, tvos, watchos) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30814 Published: 2021 10 28 19:15:08 Received: 2021 11 02 17:06:13 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-30809 (ipados, iphone_os, safari, tvos, watchos) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30809 Published: 2021 10 28 19:15:08 Received: 2021 11 02 17:06:13 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-30808 (ipados, iphone_os, tvos, watchos) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30808 Published: 2021 10 28 19:15:08 Received: 2021 11 02 17:06:13 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Article: CVE-2021-22436 (emui, magic_ui) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22436 Published: 2021 10 28 13:15:08 Received: 2021 11 02 17:06:11 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-22406 (emui, magic_ui) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22406 Published: 2021 10 28 13:15:08 Received: 2021 11 02 17:06:11 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
|
Article: CVE-2021-22403 (emui, magic_ui) - published about 3 years ago. Content: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22403 Published: 2021 10 28 13:15:08 Received: 2021 11 02 17:06:11 Feed: National Vulnerability Database Source: National Vulnerability Database Category: Alerts Topic: Vulnerabilities |
Click to Open Code Editor