CVE-2020-13949
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large...
Summary: rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of...
Summary: A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur...
Summary: A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1,...
Summary: A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1,...
Summary: A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1,...
It’s been a busy few weeks for facial recognition technology. Its oft-maligned abilities frequently wind up in tales of privacy...
Last week on Malwarebytes Labs we discussed VPN Android apps, how even the FBI has to deal with insider threats,...
The scientific and industrial company "High Technologies and Strategic Systems" (HT and SS SIJSC) will develop a computer program for...
 Hewlett Packard Enterprise (HPE) has released a security update to patch critical zero-day remote code execution (RCE) vulnerability in its...
 According to security firm FireEye, a massive Chinese espionage operation against US and European government entities includes four new hacking...
 Several hacker groups that are supposed to support Chinese long-term economic goals continue in the defense, high-tech, public, transportation, and...
CERT Kaiju is a collection of binary analysis tools for Ghidra. This is a Ghidra/Java implementation of some features of...
This repository has been made basing onto the already existing MiscTool, so big shout-out to rasta-mouse for releasing them and...
Interpol has intercepted $83 million in illicit funds transferred from victims to the accounts used by crooks. An operation conducted...
Researchers disclosed two new attack techniques that allow modifying visible content on certified PDF documents without invalidating the digital signature....
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Qihoo 360 NETLAB spotted a new backdoor dubbed Facefish that could allow attackers to take over Linux systems and steal...
The FBI is going to share compromised passwords discovered during investigations with Have I Been Pwned (HIBP)’s ‘Pwned Passwords’ service....
Secured Search is a browser hijacker that changes your browser’s settings to promote securedsearch.com, let’s remove it. Secured Search is...