Multiple Vulnerabilities in Siemens InterMesh Subscriber Devices Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Siemens InterMesh Subscriber Devices, the most severe of which could allow for remote code execution. InterMesh leverages mesh radio...
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Apple products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe...
xorg-x11-server-Xwayland-23.2.7-2.fc39
FEDORA-2024-cc2c07317b Packages in this update: xorg-x11-server-Xwayland-23.2.7-2.fc39 Update description: CVE fix for CVE-2024-9632 Read More
xorg-x11-server-Xwayland-24.1.4-1.fc40
FEDORA-2024-275a45a146 Packages in this update: xorg-x11-server-Xwayland-24.1.4-1.fc40 Update description: xwayland 24.1.4 - CVE fix for CVE-2024-9632 Read More
xorg-x11-server-Xwayland-24.1.4-1.fc41
FEDORA-2024-80c8f31c55 Packages in this update: xorg-x11-server-Xwayland-24.1.4-1.fc41 Update description: xwayland 24.1.4 - CVE fix for CVE-2024-9632 Read More
New LightSpy Spyware Targets iOS with Enhanced Capabilities
ThreatFabric researchers have discovered significant updates to the LightSpy spyware, featuring plugins designed to interfere with device functionality Read More
Chenlun’s Evolving Phishing Tactics Target Trusted Brands
The phishing campaign targeted users via texts impersonating Amazon, linked to the threat actor Chenlun Read More
USN-7084-1: urllib3 vulnerability
It was discovered that urllib3 didn't strip HTTP Proxy-Authorization header on cross-origin redirects. A remote attacker could possibly use this issue to obtain sensitive information....
The AI Fix #22: Probing AI tongues and ASCII smuggling attacks
In episode 22 of "The AI Fix", our hosts encounter a bowl of buttermilk king crab ice cream prepared by a baby hippo, a TV...
Law Enforcement Operation Takes Down Redline and Meta Infostealers
Operation Magnus took down infrastructure used to run the Redline and Meta infostealers, widely used tools in cybercriminal activities Read More