Home Tags Malicious

Tag: malicious

The emergency update addressed CVE-2018-0986, which would let an attacker execute malicious code on a Windows machine.

Pocket cryptofarms

In recent months, the topic of cryptocurrency has been a permanent news fixture — the value of digital money has been see-sawing spectacularly.
Such pyrotechnics could hardly have escaped the attention of scammers, which is why cryptocurrency fluctuations have gone hand in hand with all kinds of stories.

These include hacked exchanges, Bitcoin and Monero ransoms, and, of course, hidden mining.
The malicious use of the cellular communications devices is a "real and growing risk," a federal official told a US senator.
Therersquo;s also “anomalous activityrdquo;—probably stingraysmdash;in other US cities, too.
Machine learning requires massive amounts of data to teach the model.

But we're often uploading that data to machine learning cloud services run by folks like Amazon and Google, where it might be exposed to malicious actors.

Can we use machine-learning...
A vulnerability in the web-based user interfacenbsp;(web UI) of Cisconbsp;IOS XE Software could allow an authenticated, remote attacker to write arbitrary files to the operating system of an affected device. The vulnerability is due to insuffici...
Multiple vulnerabilities in the web-based user interfacenbsp;(web UI) of Cisconbsp;IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site scriptingnbsp;(XSS) attack against a user of the web UI of the affected so...
A vulnerability in the Cisconbsp;IOS XE Software RESTnbsp;API could allow an authenticated, remote attacker to bypass API authorization checks and use the API to perform privileged actions on an affected device. The vulnerability is due to insuf...
A vulnerability in the quality of servicenbsp;(QoS) subsystem of Cisconbsp;IOS Software and Cisconbsp;IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of servicenbsp;(DoS) condition or execute arbitrary code wit...
Multiple vulnerabilities in the CLI parser of Cisconbsp;IOS XE Software could allow an authenticated, local attacker to inject arbitrary commands into the CLI of the affected software, which could allow the attacker to gain access to the underlyin...

Your new friend, KLara

In RD we use a lot of open-source projects and we believe giving back to the community is our way of saying ‘Thank yoursquo;. More and more security companies are releasing their open-source projects and we would like to contribute with our distributed YARA scanner.
WatchGuard Launches Threat Landscape visualisation tool for analysing Firebox Feed data to better understand security threats28 March 2018 - Total malware attacks are up by 33 percent and cyber criminals are increasingly leveraging Microsoft Office doc...