Security Affairs newsletter Round 323
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Summary: Use after free in Network service in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit...
Summary: Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap...
Summary: Use after free in Sharing in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to...
Summary: Use after free in WebAudio in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap...
Summary: Use after free in TabGroups in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to...
Biometric authentication is a critical component of the IT industry's plan to eliminate the need for passwords. However, a new...
In the last year, at least $1 billion worth of digital currency was stolen worldwide. The number of extortion cases...
The Wizard Spider threat organization, which is behind the Trickbot botnet, has been connected to a new ransomware outbreak called...
Cybersecurity researchers have unearthed a new Android banking Trojan dubbed ‘Toddler’, which is infecting users across Europe. According to the...
Leaked data for sale through forums and marketplaces in cybercrime appears so frequent that it is essentially unknown, except for...
Cilium is open source software for providing and transparently securing network connectivity and loadbalancing between application workloads such as application...
Bughound is an open-source static code analysis tool that analyzes your code and sends the results to Elasticsearch and Kibana...
The US government is offering a $10 million reward to everyone that provides information on operations conducted by nation-state actors....
Cisco addressed a high severity DoS vulnerability in the Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. Cisco...
Network equipment vendor D-Link has released a firmware hotfix to fix multiple vulnerabilities in the DIR-3040 AC3000-based wireless internet router. Network equipment...
Summary: Apache HTTP Server versions 2.4.41 to 2.4.46 mod_proxy_http can be made to crash (NULL pointer dereference) with specially crafted...
Summary: Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest....
Summary: Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL...
Summary: Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured...
Summary: In MediaWiki before 1.31.15, 1.32.x through 1.35.x before 1.35.3, and 1.36.x before 1.36.1, bots have certain unintended API access....
The US Department of State has announced that its Rewards for Justice (RFJ) program is now offering: …up to $10...
A Virtual Private Network (VPN) can stop others from snooping on or tampering with your Internet traffic. It does this...
Scareware is a type of rogue program which has been around for many years, arguably dating back to 1990. It...