Home Tags Malicious

Tag: malicious

A vulnerability in the administrative shell of the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) could allow an authenticated, local attacker to escalate their privilege level and gain root access.

The attacke...
A vulnerability in the web framework of Cisco Small Business Managed Switches software could allow an unauthenticated, remote attacker to conduct an HTTP response splitting attack against a user of the web interface of an affected system. The vuln...
More than 500,000 users stung A security researcher has claimed that half a million Chrome users have been hit by four malicious browser extensions pushing click and SEO fraud.…
Google removes four extensions that used infected computers in click fraud scheme.
Researchers at network security vendor ICEBRG recently discovered four malicious extensions in the official Google Chrome Web Store with a combined user count of more than 500,000, and as with past incidents, the implications are serious for both consu...
ICEBRG Security Research team's finding highlights an often-overlooked threat.
At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild.
In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago.
“Low complexityrdquo; hack for Transmission client may work against other clients, too.
Google removes 60 apps packing the "AdultSwine" malware.
New Encrypted Traffic Analytics is designed to help enterprises inspect encrypted traffic for malicious activity without having to decrypt it first.
A vulnerability in the web-based management interface of Cisconbsp;Unified Communications Manager could allow an unauthenticated, remote attacker to perform a cross-site scriptingnbsp;(XSS) attack against a user of the web-based management interf...
Backups of virtual machines on some hosts could be accessed or altered by an attacker.