X

Vous n'êtes pas connecté

Maroc Maroc - BLEEPINGCOMPUTER.COM - A La Une - 01/Apr 21:35

Hackers exploit TrueConf zero-day to push malicious software updates

Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all connected endpoints. [...]

Articles similaires

Sorry! Image not available at this time

Hackers exploit TrueConf zero-day to push malicious software updates

bleepingcomputer.com - 01/Apr 21:35

Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all...

Sorry! Image not available at this time

TrueConf Zero-Day Exploited in Asian Government Attacks

itsecuritynews.info - 13:13

A Chinese threat actor exploited the video conferencing platform to perform reconnaissance, escalate privileges, and execute additional payloads. The...

Sorry! Image not available at this time

TrueConf Zero-Day Exploited in Asian Government Attacks

itsecuritynews.info - 13:13

A Chinese threat actor exploited the video conferencing platform to perform reconnaissance, escalate privileges, and execute additional payloads. The...

Sorry! Image not available at this time

Vim Vulnerability Let Attackers Execute Arbitrary Command Via Weaponized Files

itsecuritynews.info - 30/Mar 13:06

A high-severity security flaw has been discovered in Vim, one of the most widely used text editors among developers. This vulnerability allows...

Sorry! Image not available at this time

It’s a mystery … alleged unpatched Telegram zero-day allows device takeover, but Telegram denies

securityaffairs.co - 30/Mar 14:07

A critical Telegram flaw could allow zero-click remote code execution on devices, but Telegram denies it. Researcher Michael DePlante (@izobashi) of...

Sorry! Image not available at this time

Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now

bleepingcomputer.com - 30/Mar 10:59

F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers...

Sorry! Image not available at this time

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

itsecuritynews.info - 02/Apr 04:09

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system....

Sorry! Image not available at this time

Vim Modeline Bypass Vulnerability Let Attackers Execute Arbitrary OS Commands

itsecuritynews.info - 02/Apr 04:09

A newly discovered high-severity vulnerability in the popular Vim text editor exposes users to arbitrary command execution on the operating system....

Sorry! Image not available at this time

TeamPCP deploys Iran-targeted wiper in Kubernetes attacks

bleepingcomputer.com - 23/Mar 20:09

The TeamPCP hacking group is targeting Kubernetes clusters with a malicious script that wipes all machines when it detects systems configured for...

Sorry! Image not available at this time

Coruna iOS exploit framework linked to Triangulation attacks

bleepingcomputer.com - 26/Mar 13:10

The Coruna exploit kit is an evolution of the framework used in the Operation Triangulation espionage campaign, which in 2023 targeted iPhones via...