CVE-2021-33640
After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t:...
Ransomware Groups to Increase Zero-Day Exploit-Based Access Methods in the Future
Trend Micro’s latest research paper analyzed ways in which ransomware groups could evolve to stay on top of strengthened cyber-protection measures Read More
libtar-1.2.20-26.fc37
FEDORA-2022-88772d0a2d Packages in this update: libtar-1.2.20-26.fc37 Update description: fix use-after-free bugs introduced by incorrect memleak fixes (CVE-2021-33640) Read More
libtar-1.2.20-26.fc36
FEDORA-2022-ccc68b06cc Packages in this update: libtar-1.2.20-26.fc36 Update description: fix use-after-free bugs introduced by incorrect memleak fixes (CVE-2021-33640) Read More
Meta Takes Down Over 200 Covert Influence Operations Since 2017
The most common location for influence operations was Russia, according to Meta Read More
xorg-x11-server-Xwayland-22.1.7-1.fc36
FEDORA-2022-3f40d00dd9 Packages in this update: xorg-x11-server-Xwayland-22.1.7-1.fc36 Update description: xwayland 22.1.7 Read More
CVE-2020-36619
A vulnerability was found in multimon-ng. It has been rated as critical. This issue affects the function add_ch of the file demod_flex.c. The manipulation of...
CVE-2020-36618
A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file index.coffee. The manipulation leads to improperly...
How to Surrender to a Drone
The Ukrainian army has released an instructional video explaining how Russian soldiers should surrender to a drone: “Seeing the drone in the field of view,...
Mobile App Users at Risk as API Keys of Email Marketing Services Exposed
Leaked API keys allow threat actors to perform a variety of unauthorized actions Read More